Linux Set 9
Terms
undefined, object
copy deck
- What HOWTO is Kevin Fenzi associated with?
- Linux Security HOWTO
- What is Domino?
- an email server
- What is the KDE-based web browser?
- Konquerer
- What type of filesystem is ReiserFS?
- a journaling file system
- What two advantages does ReiserFS have over ext2?
- faster recovery from errors and faster and more secure hard drive writes
- What two space-saving features does ReiserFS have?
-
-fast balanced trees: allows multiple small files to be written to a single block
-doesn't used fixed space for inode allocation - What is an MUA?
- Mail User Agent- the program run by end users
- What is an MTA?
- Mail Transfer Agent- application used to transfer email between servers
- What is a delivery agent?
- the service that places mail in a mailbox
- What is the most common Linux delivery agent?
- procmail
- What does Linux use to access remote files?
- the Network File System (NFS)
- Who created the Network Information Service (NIS)?
- Sun
- How does NIS make using NFS easier?
- NIS allows the server to maintain configuration files for the entire network
- Who created the Server Message Block (SMB) protocol?
- Microsoft
- What limitation does SMB have?
- not efficient on larger networks
- What two protocols were created to replace SMB?
- Common Internet File System (CIFS) and Network Basic Input/Output System (NetBIOS)
- Who created Samba?
- Andrew Tridgell
- What protocol does Samba use to communicate with Microsoft resources?
- SMB
- What does Linux use to communicate with MacOS resources?
- Netatalk
- What is Linux's enterprise news server?
- InterNetNews (INN)
- What is Dig?
- an indexing and searching system for a domain or intranet
- What limitation does Dig have?
- not efficient on larger networks
- What are chains?
- sets of rules in ipchains to filter network traffic
- What three chains are ipchains organized into?
- input chain, forward chain, and output chain
- In ipchains, what is the difference between deny and reject?
- reject notifies the sender; deny does not
- What is IP Masquerade?
- form of NAT used with ipchains
- How do stateful firewalls differ from stateless firewalls?
- stateful firewalls inspect payloads as well as headers
- When booting, what does the "L" in "LILO" indicate?
- that the primary boot loader has started
- When booting, what does the "I" in "LILO" indicate?
- That the secondary boot loader has loaded
- When booting, what does the second "L" in "LILO" indicate?
- That the secondary boot loader has signalled that it has loaded
- When booting, what does the "O" in "LILO" indicate?
- that booting completed properly
- What is the default inode density for ext2?
- one inode per 4096 bits of disk space
- What are the two types of text-based installations?
- command-line and shell program
- Why can all users change their passwords even though only the owner can write to passwd?
- passwd uses setuid to set permissions when it is running
- What numeric value does read permission have?
- 4
- What numeric value does write permission have?
- 2
- What numeric value does execute permission have?
- 1
- What command will display default file permissions?
- umask