Final Exam Study Guide
1. Which runlevel is textual multi-user mode? Pg 431
3
2. Which system script contains the default runlevel? Pg425
/etc/inittab
Use the following information for study points 3-5:
A system administrator is manually setting up a new daemon named analyzed. The daemon should be set to run at runlevel 3 and be the very last daemon to load.
3. What should the link to start the daemon be named? Pg 426,427
s99analyzed
4. What command would stop the analyzed daemon? Pg 427
service analyzed stop
5. What command would tell the system at which runlevels to start analyzed? Pg 430
chkconfig -level 35 analyzed
6. What command would let you most safely switch to runlevel 2 without rebooting
…show more content…
Pg 794
/var/named/chroot/var/named
34. Know all of the record types that maps a host name to an IP address and is used for forward lookups. Pg 780
A (address), Cname, MX, NS, PTR, SOA
35. Know all of the record types maps an alias to a host name. Pg 780
CNAME
36. Which configuration file would an administrator normally modify in order to change the IP address that sendmail listens on? Pg 673 sendmail.mc
37. What port does sendmail listen on? Pg 671
25
38. Which file allows sendmail to host accounts for multiple domains? Pg 681
virtusertable
39. Dovecot provides which two protocols? Pg 689
IMAP and POP
40. Know all of the examples of an MTA. Pg 669
sendmail
41. What file is used to tell a Linux system which resources to use (and in what order) for services such as authentication and name resolution? Pg 696
/etc/nsswitch.conf
42. The main configuration file for LDAP is __________. Pg 711
/etc/openldap/ldap.conf
43. The root, or top-level, domain in an LDAP hierarchy is called the _______. Pg 711
DSE
44. What port does LDAP use for unencrypted traffic . Pg 713
389
45. What represents a fully Distinguished Name? Pg 711
cn=joe.ou=workers;dc=factory.dc=com
46. What can be best described as a divider between fields in a data file? Pg 1024
Delimiter
47. In regular expressions, which character is used to tell a utility to look for the given
| Allows users to organize data in rows and columns and perform calculations and recalculate when data changes.
5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?
system to talk to itself. The IP address of the loopback serviceis always 127.0.0.1, while 127.0.1.1 names the local system.
DNS (Domain Name System) : used to translate the internet protocol services. Stand-alone daemon run by script named.
2. How would you instruct an Apache server to listen on Port 81 instead of Port 80?
This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). Specifically, the following NIST Access Controls (AC) are addressed:
Question 8.8. (TCO 2) The _____ number is the number of the column in the lookup table that contains the return values. (Points : 2)
KDDcup99 dataset. Each record of this dataset data set has 41 features derived for each connection and a
35. Know all of the record types maps an alias to a host name. Pg 780
Network protocol communications, network connections established by host computer, network routing information, information about computers
Analysis mode: The procedure is done to estimate different types of molecules and their individual quantities in the mixture using the help of a detector.
1. You have a network address of 201.79.187.0 and a subnet mask of 255.255.255.192. Which three of the following are valid subnet addresses?
a.) Candidate keys Ship Relation: ship number, ship name. Cruise Relation: cruise number. Port Relation: port name, country. Visit Relation: cruise number, port name, country.
P1: The first method in network addressing is, Fully Qualified Domain Name which is known as FQDN for short. FQDN is used as the domain name for a specific host or computer name on the internet. FQDN consists of two main parts, the domain name and the hostname. For example, Belfast Met is the hostname, but the domain name is belfastmet.ac.uk.
3. Values Scan. Analysis is necessary to identify the deficiencies and errors that need modification.