Archive

Archive for the ‘Chapter Review Questions’ Category

Chapter 12 Review Questions

April 19, 2010 Leave a comment

1. What are the SLES local security settings?

2. What three file system permissions that affect security?

3. What are the files that define special permissions?

4. How can you define what events are logged in SLES?

5. What are the important log files located in /var/log?

6. What does the sudo command do?

7. What are the commands used to monitor disk usage in SLES?

8. What commands are available in Linux to allow you control what kind of IP traffic is permitted on your SLES system?

9. What is intrusion detection? What tools does SLES provide to perform intrusion detection?

Chapter 11 Review Questions

April 14, 2010 Leave a comment

1. What are NIS domain components?

2. What are some of the security considerations that should be taken into account when implementing NIS?

3. What utilities can be used to manage NIS?

4 . What directories contain NIS configuration information for clients and servers.

5. What Windows functionality/feature(s) can you compare NIS to?

6. Compare NIS to LDAP. What are the drawbacks and advantages of each?

7. What components make up the structure of an LDAP Directory tree?

8. What protocols are defined as necessary for sending mail in a Linux Environment?

9. Compare the mail server and client tools available for use in Linux.

10. Define the following: MTA, MDA, Mailstore, POPD, IMAPD

Chapter 9 Review Questions

April 11, 2010 Leave a comment

1. What are the three main classes of network addresses? How many bits does each use for the network I’d of an IP address?

2. According to your text there are 5 basic network components for TCP/IP communication. What are they? Can you think of any other components?

3. How does IPv6 differ from IPv4?

4. What is a virtual alias (also known as an IP alias)? How do we use IP aliases in our lab environment?

5. How does the Linux route statement differ from the Windows route statement? What does the Linux -net option do?

6. What does the netcat command do? Why is netcat preferable to telnet?

7. What commands are commonly used to configure and troubleshoot TCP/IP communication in Linux?

Chapter 7 Review Questions

April 6, 2010 4 comments

1. In which configuration file does Linux store information about users and groups?

2. Explain the Linux standard for assigning UIDs. What is a UID used for? Are there any obvious strengths or weaknesses you can see in this system?

3. List and explain the different commands to add, change and delete users and groups.

4. Explain why using the CHMOD 755 command and switch makes a file executable. Can you represent it in an equation?

5. List the some command (s)/ switches used to manage disk quota.

6. List the advantages and disadvantages of the REISERFS over the ext2 and ext3 file systems.

7. Explain the process for installing software from a. rpm package.

Chapter 4 Review Questions

March 31, 2010 Leave a comment
  1. What switches can be used with the YAST command?
  2. What are the filters you can select when installing software with YAST?
  3. What is a software installation source?
  4. What files are created/updated once you create a user or group account using YAST?
  5. What tasks/concepts are necessary to understand to configure the X Window system?
  6. What is a Window manager?
  7. What is the command to start the twm window manager?
  8. What are the three login managers found in SLES?
  9. What is SSH?

Chapter 2 Questions

March 29, 2010 Leave a comment
  1. Explain the difference between X server and a client application?
  2. How does X server differ from a Windows client/server implementation?
  3. What is a Window Manager? What functions does it provide?
  4. What are the KDE desktop components?
  5. What are the GNOME desktop components?
  6. What are the KDE and GNOME file managers?
  7. What is a virtual terminal?
  8. What are the pros and cons of using a GUI vs using a command line interface?

Study Guide

Section 2 Using the Linux Desktop