NT 1430
Tyrel Cain (19103625)
Tyrel Cain
NT1430
4/30/2015
Unit 7 Chapter Exercises
Chapter 22
1. What are three reasons to use NFS?
a. NFS reduces storage needs.
b. NFS simplifies system administration.
c. NFS makes backing up data simpler.
d. NFS improves data consistency and reliability. 2. Which command would you give to mount on the local system the /home?
Directory hierarchy that resides on the file server named plum? Assume the mounted directory hierarchy will appear as /plum.home on the local system. How would you mount the same directory hierarchy if it resided on the fileserver at 192.168.1.1? How would you unmount /home?
$ sudo mount plum:/home /plum.home
$ sudo mount 192.168.1.1:/home /plum.home
$ sudo umount /home
3. How would you list the mount points on the remote server named plum that the local client named guava can mount?
$ showmount -e plum | grep guava
4. Which command line lists the currently mounted NFS directory hierarchies?
$ mount | grep nfs4 or $ df -t nfs4
5. What does the /etc/fstab file do?
The fstab file facilitates mounting directory hierarchies. You can use fstab to mount directory hierarchies automatically when the system comes up and to allow ordinary users to mount a directory hierarchy.
6. From a server, how would you allow readonly access to /opt for any system in example.com?
Place the following line in /etc/exports:
/opt *.example.com(ro)
Chapter 25
1. How would you remove all iptables rules and chains, but not change policy? The following command removes all iptables rules and chains but does not change policy:
# iptables --flush && iptables --delete-chain
2. How would you list all current iptables rules?
The following command lists all iptables rules:
# iptables -L --line-numbers
3. How is configuring iptables different from configuring most Linux services? Most Linux services are configured using configuration files. You configure iptables by issuing instructions one at a time.
4. Define an iptables rule that will reject incoming connections on the
TELNET port.
The following command rejects incoming connections on the TELNET port: # iptables --append FORWARD --sport telnet --jump REJECT
5. What does NAT stand for? What does the NAT table do?
NAT is an acronym for Network Address Translation. Packets that create
New connections are routed through the NAT table, which translates the
Source or destination field of the packet.
References
Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file.
Chapter Summary
I believe NFS allows a server to share selected local directory hierarchies with client systems on a heterogeneous network, thereby reducing storage needs and administrative overhead. NFS defines a client/server relationship in which a server provides direc- tory hierarchies that clients can mount.
References: Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file. Chapter Summary I believe NFS allows a server to share selected local directory hierarchies with client systems on a heterogeneous network, thereby reducing storage needs and administrative overhead. NFS defines a client/server relationship in which a server provides direc- tory hierarchies that clients can mount.
You May Also Find These Documents Helpful
-
Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…
- 609 Words
- 3 Pages
Satisfactory Essays -
1. Which of the following service priority guidelines are not accurate D- You should rate departmental issues according to how the issues affect senior management.…
- 669 Words
- 2 Pages
Satisfactory Essays -
| Red hat is an easy Unix system for first time unix users to administer. This is built to be user friendly for administrators and users.…
- 489 Words
- 2 Pages
Good Essays -
2. A pretest loop is a loop tests the conditions before performing the iteration. A posttest loop performs the iteration then test the condition.…
- 261 Words
- 2 Pages
Satisfactory Essays -
Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disks on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations.…
- 638 Words
- 2 Pages
Good Essays -
1. A live system gives you a chance to preview Fedora without installing it. It does not write/install to hard disks.…
- 516 Words
- 2 Pages
Good Essays -
Server Backup. You also configured the organization’s Web servers to host content from a single…
- 246 Words
- 2 Pages
Satisfactory Essays -
6 Are Texas well informed about government and elected officials? Do they trust government? 4…
- 1621 Words
- 6 Pages
Powerful Essays -
1. Analyze the changes in global commerce from 1750 to 1914 due to changes in technology, communication and economic theory.…
- 386 Words
- 2 Pages
Satisfactory Essays -
Depending on the installation being done, Fedora/RHEL either overwrites all the files on the hard drive, or updates the software that has new versions.…
- 613 Words
- 3 Pages
Powerful Essays -
13. True or False. Younger teen boys are more likely to engage in physical fights.…
- 321 Words
- 3 Pages
Satisfactory Essays -
Made the three branches of government to keep checks within the republican government to make sure no one had to fear that tyranny or abuse of power was possible…
- 392 Words
- 2 Pages
Satisfactory Essays -
1. What are the four types of evidence in a criminal investigation? The four types of evidence in a criminal investigation are physical, documentary, a testimony and demonstrative evidence.…
- 512 Words
- 2 Pages
Satisfactory Essays -
Structuration Theory is a social theory based on several Theorists throughout time but notably Anthony Giddens. Basically Structuration Theory of our social systems stating that both structure and agents are equal in how we interact socially.…
- 409 Words
- 2 Pages
Satisfactory Essays -
1. Provide examples of resources that are temporarily restricted as to: (a) purpose; (b) time; and (c) the occurrence of a specific event. Provide an example of permanently restricted resources.…
- 295 Words
- 2 Pages
Satisfactory Essays