1. Which runlevel is textual multi-user mode? Pg 431 3
2. Which system script contains the default runlevel? Pg425
/etc/inittab
Use the following information for study points 3-5:
A system administrator is manually setting up a new daemon named analyzed. The daemon should be set to run at runlevel 3 and be the very last daemon to load.
3. What should the link to start the daemon be named? Pg 426,427 s99analyzed
4. What command would stop the analyzed daemon? Pg 427 service analyzed stop
5. What command would tell the system at which runlevels to start analyzed? Pg 430 chkconfig -level 35 analyzed
6. What command would let you most safely switch to runlevel 2 without rebooting the computer? Pg 431 Telinit 2
7.
…show more content…
Pg 780
A (address), Cname, MX, NS, PTR, SOA
35. Know all of the record types maps an alias to a host name. Pg 780 CNAME
36. Which configuration file would an administrator normally modify in order to change the IP address that sendmail listens on? Pg 673 sendmail.mc
37. What port does sendmail listen on? Pg 671
25
38. Which file allows sendmail to host accounts for multiple domains? Pg 681
virtusertable
39. Dovecot provides which two protocols? Pg 689
IMAP and POP
40. Know all of the examples of an MTA. Pg 669 sendmail 41. What file is used to tell a Linux system which resources to use (and in what order) for services such as authentication and name resolution? Pg 696
/etc/nsswitch.conf
42. The main configuration file for LDAP is __________. Pg 711
/etc/openldap/ldap.conf
43. The root, or top-level, domain in an LDAP hierarchy is called the _______. Pg 711
DSE
44. What port does LDAP use for unencrypted traffic . Pg 713
389
45. What represents a fully Distinguished Name? Pg 711
cn=joe.ou=workers;dc=factory.dc=com
46. What can be best described as a divider between fields in a data file? Pg 1024
Delimiter
47. In regular expressions, which character is used to tell a utility to look for the given string at the beginning of the line? Pg 1026 ^
48. Which set of characters is used to define a character class in regular
What are the most important difference (art, science, religion) between people’s lives in large agricultural settlements such as çatal hüyük Jericho and Mesopotamia (manufactured trade) and Egypt (military)?
The /etc/resolv.conf file is the resolver configuration file. It provides access to DNS for Internet address resolution. The nameserver line indicates which systems the local system should query to resolve hostnames into IP
Which of the following Windows commands will shutdown and restart your computer in 2 minutes?
During the Late Kaskaskia (Cratonic Sequence 3), what type of deposition predominated on the craton?
Which of the following was evidence to support Vanzetti's innocence during the Braintree robbery and double murder trial?
5. What command would tell the system at which runlevels to start analyzed? Pg 430
This file is used to tell a Linux system which resources to use (and in what order) for
The type of data that is represented using an infinite scale of values as represented in the accompanying
A domain name is an easily searchable name that is linked to an IP or Internet Protocol address. The Domain Name System
An application that runs at the network application layer and above is referred to a network service. These services are important because they provide data storage, manipulation, as well as presentation. UMUC College needs to automatically assign IP addresses to the devices that are connected to its network. Additionally, the DHCP server help in centrally managing its address space, as any changes to network configurations will be done centrally to the server. Currently, emails have become one of the official communication means in many organizations; therefore, UMUC
It is a first level of hierarchy level of the strategy which includes the overall scope of the organization structure and it also included the different type of value added in the different parts of function.
BIND is one of the most popular DNS servers used across the Internet. The server
The ‘host’ substring identifies a computer or network device. Hosts come from standard databases like DNS and can be names or IP addresses. For example, compnetworking.about.com is the host here.
Most American servers utilize three-letter top level domains (Example ".com", ".edu"). Nations other than the USA ordinarily utilize two letters, or blends of two letters (Example ".au", ".ca", ".co.jp").
Booting of computer: the starting and restarting of a computer, the OS is loaded into the system’s main memory, setting up the OS to run applications. Basic reboot keys are ctrl, alt and delete.