Skip to main content

Red Hat Linux Networking and System Administration


Popular Questions (Find your question and click to view)

1.Give a brief introduction to UNIX.
2.Introduction to Linux.
3.What is GNU project?
4.What are Linux Distributions?
5.Who is System administrator?
6.What are servers?
7.Explain the process of installing and configuring application software.
8.Explain the process of creating and maintaining user accounts in Linux.
9.Explain the backing up and restoring files in Linux.
10.How monitoring and tuning performance of system is done by system administrator.
11.How to configure secure system in Linux.
12.Explain the tools used to monitor system security.
13.Explain the boot process in Linux.
14.Explain the Boot loader GRUB used in Linux.
15.How to use GRUB during the Boot process?
16.Explain the ‘/sbin/init’ or ‘init’ program.
17.Explain the runlevels in Linux.
18.Explain the rc script and how they can be managed by manually.
19.Explain the GRUB configuration file.
20.Explain file system structure in Linux.
21.Explain the file systems supported by Linux.
22.Explain memory and virtual file system in Linux.
23.Explain dispartitioning on X86 machine.
24.How to mount other operating system partitions/slices in Linux.
25.What are metadevices?
26.What are logical volumes?
27.What is RAID? Explain types of RAID in detail.
28.How to manage rc scripts using chkconfig?
29.How loader works? State the difference between GRUB and LILO.
30.Discuss System wide shell configuration Scripts in Linux.
31.Write a note on ‘etc/motd’.
32.Write a note on issue file.
33.Write a note on issue.net file.
34.Write a note on fstab file.
35.Write a note on cron files.
36.Write a note on syslog.conf file.
37.Write a note on ‘ld.so.conf’ file.
38.Write a note on ‘logrotate.conf’ file.
39.How to manage rc script using chkconfig?
40.Explain different configuration files in the /etc/sysconfig directory.
41.Explain network configuration files in /etc/sysconfig/network-scripts.
42.Explain TCP/IP networking.
43.Explain network classes.
44.Explain process of setting up a NIC (Network interface card).
45.Explain how to set an alias for the NIC.
46.Explain the IPv4 address with the help of
a) Different formats of representation i.e. dotted decimals and binary.
b) Classes in both the formats.
c) Interpretation of the IP addresses.
47.Explain submit mask and subnetting and advantages.
48.Explain the concept of subnetting the network.
49.How to configure Routers and Gateways?
50.Explain how to configure DHCP client?
51.How to configure network using Network Configuration Tool?
52.How to add an Ethernet device using Network configuration tool ?
53.How to change the NIC configuration?
54.How to manage host in Linux?
55.Explain Network file system (NFS).
56.Explain Network File System V 4 (NFSv4).
57.What are the advantages of Network file system (NFS)?
58.What are the disadvantages of Network file system (NFS)?
59.How to plan NFS installation?
60.List the NFS Configuration files, status files, daemon, commands and scripts.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Absolute Links vs. Relative Links – SEO Value

Absolute Links vs. Relative Links – SEO Value The debate between  absolute links and relative links  continues to live on in the SEO world. The individual significance of each has been contested, but it is widely regarded that absolute links provide better SEO value on the whole than relative links. Many believe that absolute links have less potential for getting messed up when search engines index your page. It shouldn’t really make a difference, but many conclude that this is reason enough. Read more...

What are the server and client security considerations?

72.What are the server and client security considerations? Ans. Server security considerations: 1. Always use the root_squash option in /etc/exports. 2. Enabled by default so do not disable it. 3. With root squashing clients root account can’t even access or change files that only server’s root account can change or access. Client security considerations: 1. Disable SUID (set UID) programs on NFS mounts using nosuid option. 2. Prevents server’s root account from creating an SUID root program on an exported FS, logging in to the clients as a normal user, and then using the UID root program to become root on the client.