Preview

it 320 Essay Example

Satisfactory Essays
Open Document
Open Document
407 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
it 320 Essay Example
Week #7 Assignment
1. What are three reasons to use NFS?
2. Which command would you give to mount on the local system the /home directory hierarchy that resides on the file server named plum? Assume the mounted directory hierarchy will appear as /plum.home on the local system.
3. How would you mount the same directory hierarchy if it resided on the fileserver at 192.168.1.1?
4. How would you unmount /home?
5. How would you list the mount points on the remote server named plum that the local client named guava can mount?
6. Which command line lists the currently mounted NFS directory hierarchies?
7. What does the /etc/fstab file do?
8. From a server, how would you allow readonly access to /opt for any system in example.com?
9. How would you remove all iptables rules and chains, but not change policy?
10. How would you list all current iptables rules?
11. How is configuring iptables different from configuring most Linux services?
12. Define an iptables rule that will reject incoming connections on the TELNET port.
13. What does NAT stand for? What does the NAT table do?
3. If your firewall allowed only the machine with the IP address 192.168.1.1 to send email outside the network, how would you instruct the local copy of send mail to use this server as a relay?
If your firewall allowed only the machine with the IP address 192.168.1.1 to send email outside the network,
4. What does dnl stand for in the m4 macro language? What are dnl commands used for?
The dnl command, which stands for delete to new line, instructs the compiler to ignore anything on a line following a dnl. It is used to set off.
5. Spam Assassin is installed on your mail server, with the threshold set to an unusually low value of 3, resulting in a lot of false positives. What rule could you give to your mail client to allow it to identify spam with a score of 5 or higher?
6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system.
a.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    3. When the 172.16.8.5 IP host responded to the ICMP echo-request, how many echo-reply packets were sent back to the workstation?…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 20 lab

    • 284 Words
    • 2 Pages

    4. What does dnl stand for in the m4 macro language; what are dnl commands used for?…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1. Which of the following is true about a TCP/IP network? The network uses standards defined in TCP/IP RFC's plus other standards.…

    • 1038 Words
    • 4 Pages
    Good Essays
  • Good Essays

    nt1230

    • 905 Words
    • 6 Pages

    List three possible reasons why you might be unable to connect to your computers web server using a browser on another computer.…

    • 905 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 NT1430

    • 377 Words
    • 2 Pages

    4. The df utility displays all mounted filesystems along with information about each. Use the df utility with the –h (human-readable) option to answer the following questions…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ch09 Solutions

    • 1016 Words
    • 5 Pages

    8. Why is it unlikely that you will fi nd the IP address 192.168.250.10 on the Internet?…

    • 1016 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    10. What do you believe would be the result of installing and configuring a web server to “listen” on ports other than 80 and 443? 8080…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 273 Unit 1

    • 316 Words
    • 2 Pages

    4. Describe two hypothetical situations, one in which a peer-to-peer network would be most appropriate and one in which a client-server network would be most appropriate, and explain why the particular network type would be most appropriate for that case.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1430 Unit 2

    • 393 Words
    • 2 Pages

    1. Is each of the following an absolute pathname, a relative pathname, or a simple pathname?…

    • 393 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    Like all UNIX systems, its file system is based on one root directory, or hierarchical top point with subdirectories underneath it. Some sub-directories act as mount points, where different physical or networked file systems may be incorporated.…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 726 Words
    • 3 Pages

    Truth Table 0 AND 0 = False (0) / 1 AND 0 False (0) / 1 AND 1 True (1)…

    • 726 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Capstone Review

    • 2842 Words
    • 11 Pages

    2. Use the OSI model to explain how an email message from you gets read by the…

    • 2842 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    2. You are the network administrator for a company that has a peer-to-peer network. How would the pieces and components of this network relate to each other? Define all of the components of this type of network.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 4

    • 425 Words
    • 2 Pages

    c. What /etc/exports entry would export a directory named /nfs to all clients on the subnet 192.168.10.0 and give them read-only access?…

    • 425 Words
    • 2 Pages
    Satisfactory Essays