CORRECT TEXT

CORRECT TEXT Configure iptables, there are two domains in the network, the address of local domain is 172.24.0.0/16 other domain is 172.25.0.0/16, now refuse domain 172.25.0.0/16 to access the server. View Answer Answer: below ✑ iptables -F ✑ service iptables save ✑ iptables -A INPUT -s 172.25.0.0/16 -j REJECT ✑ service iptables save ✑...

CORRECT TEXT

CORRECT TEXT Configure the verification mode of your host account and the password as LDAP. And it can login successfully through ldapuser40. The password is set as "password". And the certificate can be downloaded from http://ip/dir/ldap.crt. After the user logs on the user has no host directory unless you configure the autofs in the...

CORRECT TEXT

CORRECT TEXT You are new System Administrator and from now you are going to handle the system and your main task is Network monitoring, Backup and Restore. But you don’t know the root password. Change the root password to redhat and login in default Runlevel. View Answer Answer: When you Boot the System, it...

CORRECT TEXT

CORRECT TEXT Create a new logical volume according to the following requirements: The logical volume is named database and belongs to the datastore volume group and has a size of 50 extents. Logical volumes in the datastore volume group should have an extent size of 16 MB. Format the new logical volume with a...

CORRECT TEXT

CORRECT TEXT Configure /var/tmp/fstab Permission. Copy the file /etc/fstab to /var/tmp/fstab. Configure var/tmp/fstab permissions as the following: Owner of the file /var/tmp/fstab is Root, belongs to group root File /var/tmp/fstab cannot be executed by any user User natasha can read and write /var/tmp/fstab User harry cannot read and write /var/tmp/fstab All other users (present...