Question

In: Computer Science

Managing Linux Servers (Apache, Samba, DNS, 1. What is the Apache directive that specifies the base...

Managing Linux Servers (Apache, Samba, DNS,

1. What is the Apache directive that specifies the base directory for configuration and log files?

2. Once you’ve modified httpd.conf, what command would make Apache reread this file, without kicking off currently connected users?

3. What directive specifies the TCP/IP port associated with Apache?

4. What ports must be open for a Samba server to work with remote systems?

6. What samba configuration steps are required for mapping a Windows user to a Linux user?

7. From a nfs server, how would you allow readonly access to /opt for any system in example.com?

8. How would you instruct a DNS server to respond only to queries from the 137.44.* IP range?

9. What is pNFS ?

10. What do you understand by "nfsstat --nfs --server -3" command?

11. How to retrieve a list of clients connected to the NFS server ?

14. What is a difference between Apache and Nginx web server?

15. Explain Bind chroot environment ?

20. Can Samba be a member of more than one workgroup at the same time?

Solutions

Expert Solution

1. The ServerRoot directive sets the default directory for the Apache server . Any of the files and Directories otherwise configured or configured as a relative directory   are set relative to ServerRoot.

2. There are 3 ways to make Apache reread the configuration without kicking off currently connected users by using commands below

  • Apachectl graceful
  • /ect/init.d/httpd reload
  • Service httpd reload

3. The Listen directive specifies the TCP port associated with Apache in the system.

4. To open for a Samba server to work with remote systems, the following ports must be open

  • The Port 389 (TCP) – for LDAP (Active Directory Mode),
  • The Port 445 (TCP) – NetBIOS was moved to 445 after 2000 and beyond, (CIFS),
  • The Port 901 (TCP) – for SWAT service (not related to client communication)

6. For this you have to” Set the username map parameter in smb.conf to point to the map file, frequently /etc/samba/smbusers, and assign a Samba password to the user”

7. Place the following line in “ /etc/exports: /opt *.example.com(ro,sync)” in the command line to get Access.

8. Add the following line to the Options clause in “/etc/bind/named.conf: allow-query { 137.44.0.0/24 };” to Instruct DNS server.

9. pNFS means Parallel Network File System is the part of the NFS v4.1 protocol that allows compute clients to access storage devices directly and in parallel. And it mostly uses in remote systems.

10. It will show statistics for NFS version 3 server

11. To retrieve a list of clients connected to the NFS server netstat -a | grep nf

15. By running bind in a chroot environment means named process will be limited to their directory only (/var/named/chroot). By doing this can help improve system security by placing BIND in a ”sandbox”, which will limit the damage done if a server is compromised.

20. No, Samba can be a member of only one workgroup.


Related Solutions

2. Describe in detail i)what information should be added in which DNS servers for your own...
2. Describe in detail i)what information should be added in which DNS servers for your own start-up company (say ‘nwguru.com’) that has a webserver and email service to its employees. ii) What are companies you can contact for domain name registration and how much are the fees?
1. Briefly explain how virtualization of Linux Servers may be used in the enterprise to provide...
1. Briefly explain how virtualization of Linux Servers may be used in the enterprise to provide an infrastructure base capable of overcoming component failures. 2.There are different types of firewalls in LINUX. a. What are the key differences between a proxy firewall, state full firewall and packet filter? b. Which would you use if you wanted to do deep inspection of the underlying protocol? 3. A system administrator has been given a new domain foobar.com. Assuming the domain has not...
LAB 7.1 MANAGING USER ACCOUNTS STEP 1. Open a terminal window in linux.                               &n
LAB 7.1 MANAGING USER ACCOUNTS STEP 1. Open a terminal window in linux.                                         STEP 2. Execute the correct command to display user account information (including the login shell and home directory) for the bin account.                                         STEP 3. Execute the correct command to display user password information (including the encrypted password and password aging) for the bin account.                                         STEP 4. The command in step 3 should have failed. Execute the correct su command to change your account so...
Linux Basics 1.In Linux what is a Window Manager –name a window manager that is commonly...
Linux Basics 1.In Linux what is a Window Manager –name a window manager that is commonly used? 2.If you were in a organisation that wanted to run a commercially backed distribution of Linux which one would you pick? 3.After the kernel is invoked at boot time, describe what happens? 4.Why is it common practice to use a boot loader? 5.Name two loaders used in Linux? 6.What is systemd? How is it used? 7.What does systemdreplace? Why was the choice made...
1. When a file is created on Linux Operating System, What are the default permissions of...
1. When a file is created on Linux Operating System, What are the default permissions of the file? 2. Write a command to find the total disk space used by a specific user on linux system? 3. What is "s" permission bit in a file? 4. Explain the difference between grep and egrep? 5. Write a command to list files where third letter is x or y? 6. Write command to remove array element with id 5? 7. Write a...
1.what is a base condition of recursive function? 2. why is the base condition of recursive...
1.what is a base condition of recursive function? 2. why is the base condition of recursive function important?
Part#1 What are the default username and password for Kali Linux? How many bits is the...
Part#1 What are the default username and password for Kali Linux? How many bits is the MD5 hashing algorithm? How many bits is the SHA1 hashing algorithm? Which hashing algorithm is more accurate, MD5 or SHA1? Part#2 What is the command to unmount a partition? In what directories are mount points typically created on Linux? When the ls –l command is used, what is designated in the first column to indicate a file? When the ls –l command is used,...
1. What is an ointment base? 2. What is an ointment? 3. What is the name...
1. What is an ointment base? 2. What is an ointment? 3. What is the name of a commercial product (made by Cheesebrough-Pond's) consisting of white petrolatum?
Explain what each of the following metacharacters mean within the shell linux. 1. > (greater than)...
Explain what each of the following metacharacters mean within the shell linux. 1. > (greater than) 2. < (less than) 3. | (vertical bar)
Linux operation 1. Explain what this command does: rpm –qai | more ..... ? 2. Ps...
Linux operation 1. Explain what this command does: rpm –qai | more ..... ? 2. Ps – Af |grep -v ^root, Explain how this command to find application processes could helpful in the real world to the system administrator?? 3. Clearly describe 3 valid command options, and their meaning, of this command used to add users? 4. List 2 different variants of the Unix (not Linux) operating system, as well as their corresponding vendor (the company that developed them) ?...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT