1. What are three reasons to use NFS?
2. Which command would you give to mount on the local system the /home directory hierarchy that resides on the file server named plum? Assume the mounted directory hierarchy will appear as /plum.home on the local system.
3. How would you mount the same directory hierarchy if it resided on the fileserver at 192.168.1.1?
4. How would you unmount /home?
5. How would you list the mount points on the remote server named plum that the local client named guava can mount?
6. Which command line lists the currently mounted NFS directory hierarchies?
7. What does the /etc/fstab file do?
8. From a server, how would you allow readonly access to /opt for any system in example.com?
9. How would you remove all iptables rules and chains, but not change policy?
10. How would you list all current iptables rules?
11. How is configuring iptables different from configuring most Linux services?
12. Define an iptables rule that will reject incoming connections on the TELNET port.
13. What does NAT stand for? What does the NAT table do?
3. If your firewall allowed only the machine with the IP address 192.168.1.1 to send email outside the network, how would you instruct the local copy of send mail to use this server as a relay?
If your firewall allowed only the machine with the IP address 192.168.1.1 to send email outside the network,
4. What does dnl stand for in the m4 macro language? What are dnl commands used for?
The dnl command, which stands for delete to new line, instructs the compiler to ignore anything on a line following a dnl. It is used to set off.
5. Spam Assassin is installed on your mail server, with the threshold set to an unusually low value of 3, resulting in a lot of false positives. What rule could you give to your mail client to allow it to identify spam with a score of 5 or higher?
6. Describe the software and protocols used when Max sends an email to Sam on a remote Linux system.
a.