• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/185

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

185 Cards in this Set

  • Front
  • Back
LVM ?
Logical Volume Manager
/dev/hda ?
Primary Master IDE
/dev/hdb ?
Primary Slave IDE
/dev/hdc ?
Secondary Master IDE
/dev/hdd ?
Secondary Slave IDE
/dev/sda ?
First SCSI or SATA drive
/dev/sdb
Secondary SCSI or SATA drive
Swap partition ?
Used by Linux to move unused data from main memory to the HD.
Root partition ?
/
How much space required for minimal non-GUI install ?
1GB
How much space required for minimal GUI install ?
1.5 GB
How much space required for default install proposed by YAST ?
3 GB
How much space required for a full install including all software ?
5 GB
Partitions can be mounted by what 5 ways?
K - Kernel name, l - Label, U - UUID, I - Device ID, P - Device Path
What kind of File systems can you create with Partitioner ?
Ext2, Ext3, ReiserFS, FAT, XFS,
Swap
What are the three types of Journaling File systems you can create ?
Ext 3, ReiserFS and XFS.
What is Swap ?
Formats the partition as a swap partition.
NTP time provider ?
Server configured with the NTP protocol that provides NTP time to other servers or workstations on the network.
NTP time consumer ?
System that is configured with the NTP protocoll and reqquests NTP time from an NTP time provider.
Can a Time consumer act as a Time provider for other Servers or Clients on the Network ?
Yes
Wha does Encrypting the File system do?
Prevents unauthorized mounting of the File system.
What files should you only use "Encrypting"?
Non-system partitions such as "Home".
Mount point?
Point in the File system where you have mounted or connected too.
Can you reduce the size of a partition without deleting it?
Yes, but good idea to backup the data.
If you need to resize a Fat or NTFS partition, What steps should you complete?
Defrag & scandisk.
"Reread the Partition table"?
Resets Partition list to current disk setup. All changes are lost.
"Import Mount Points from Existing /etc/fstab"?
Scans harddisk for /etc/fstab file
"Delete Partition table and Disk Label"?
Deletes partition table and disk label on HD. All data will be lost.
Tool to create partitions at command line?
fdisk
Command to create a filesystem on a partition?
mkfs
If you use fdisk or mkfs, you
must, as the last step, edit the file ____ to make sure the file systems are mounted when the system starts.
/etc/fstab
SUSE Linux Enterprise Software uses the ____ ____ ____ for software management?
RPM Package Manager
Sometimes ___ ____ can be split into multiple packages and several small applications can be bundled into a single package.
larger applications
Sometimes one software package needs another one to run. Information on these ____
is stored in the RPM packages.
dependencies
____ is the name of the administrator of the system. Unlike regular users, who might
not have permission to do certain things on the system, ___ has unlimited power to
do anything
root
The ____ account should only be used for system administration, maintenance, and repair. Logging in as ____ for daily work is risky—a single mistake can lead to irretrievable loss of many system files?
root
Default password encryption algorithm?
Blowfish
Two possible Network Modes?
Traditional (server) or Network Manager (workstation).
Is ssh port blocked by default?
Yes
Five User Authentication methods available?
Local (/etc/passwd), LDAP, NIS, Windows domain, eDirectory LDAP
Where is user account info stored?
/etc/passwd and /etc/shadow files
Autoyast ?
Can be used to clone a install.
If a Autoyast file is created. Where is it saved?
Autoyast
SLED ?
SUSE Linux Enterprise Desktop
Session ?
is the period of time from when you log in to when you log out.
ESSID ?
Wireless Network Name
YAST?
Yet Another Setup Tool.
Novell BorderManager?
Perimeter protection for NetWare.
Novell Access Manager (Linux)?
multifactor authentication, data encryption, Web single sign-on and clientless SSL VPN.
Identity Federation ?
is the association of accounts between an identity provider and a service provider.
Corporate Identity Server ?
facilitates authentication for all
Access Manager components.
Access Manager supports a number of authentication methods, such as ____?
name/password, RADIUS token-based authentication, and X.509 digital
certificates.
User data is stored in __ __ ?
User Stores.
User stores are ____ ____ ___ to which end users authenticate. You can configure a user store with more than one replica to provide load balancing and failover capability.
LDAP directory servers
Authentication ?
process of determining who a user is.
Authorization ?
process of determining what a user is allowed to do.
Authorization policies are ____ applied after authentication and are enforced when a user attempts to access a protected resource.
dynamically
Identity Injection ?
An Access Gateway lets you retrieve information from your
LDAP directory, use it to inject information into HTML headers, query strings, or basic authentication headers, and send this information to the back-end Web servers.
Novell SecureLogin ?
provides authorized users with a single, secure login to authenticate to all their corporate resources—including the network, applications, and secure Web sites— and it eliminates the hassles and costs
associated with password-reset helpdesk calls.
Novell SecureLogin includes the following features:
■ Provides users with single sign-on access to thousands of applications, Web pages and terminal emulators
■ Supports and enforces multiple complex password policies
■ Presents a simple interface to your employees
■ Leverages your directory for centralized granular control and maximum flexibility
■ Automatically configures new passwords when old ones expire
■ Supports advanced authentication such as biometrics, smart cards, proximity cards, and more
■ Integrates seamlessly with your identity management system to automate
user-provisioning activities
■ Automatically controls workstations (including Windows Vista and SUSE®
Linux Enterprise Desktop) based on policy
Personal Management utility ?
Providing the users with the capability to configure the Novell SecureLogin
environment and view their credentials.
Sentinel ?
Security Information and Event Management solution that receives information from many sources throughout an enterprise, standardizes it, prioritizes it, and presents it to you to make threat-, risk-, and policy-related decisions.
Sentinel automates ___ ?
log collection, analysis, and reporting processes to ensure that IT controls are effective in supporting threat detection and audit requirements.
Identity Management Software Solutions ?
Novell eDirectory, Novell Identity Manager, Identity Assurance Solution and Storage Manager.
Novell Identity Manager ?
leverages a central data store—your Identity Vault (powered by eDirectory®)—to synchronize, transform, and distribute information across
applications, databases, and directories.
Identity Assurance Solution ?
To help these organizations secure critical data and stay in compliance, the Identity
Assurance Solution from Novell combines best-in-class directory services,
authentication, credentialing, provisioning, auditing, and identity synchronization
capabilities.
ZENworks software products ?
- ZENworks Asset Mgmt.
- ZENworks Configuration Mgmt.
- ZENworks Endpoint Security
- ZENworks Orchestrator
- ZENworks Patch Mgmt.
- ZENworks Suite
ZENworks Asset Management
Combines sophisticated asset inventory, software compliance, and usage tracking capabilities
into one comprehensive asset management solution.
ZENworks Configuration Management
Provides a complete range of advanced systems management
capabilities that previously required you to purchase, install, learn, and maintain a
multitude of point products.

■ Change and configuration management
■ Application delivery
■ Patch management
■ Vulnerability assessment and remediation
■ Remote management
■ Personality migration
■ Standard operating environment (SOE) deployment and maintenance
■ Asset and license management
■ Endpoint security management
ZENworks Endpoint Security Management ?
■ Personal Firewall
■ Wireless Security
■ Device Control
■ Data Encryption
■ USB Security
■ Application Control
■ Posture and Integrity
■ Client Self Defense
■ Alerts/Monitoring/Reporting
ZENworks Orchestrator ?
■ Resource management
■ Job management
■ Dynamic provisioning
■ Policy management
■ Accounting and auditing
■ Real-time availability
Novell ZENworks Orchestrator keeps a careful eye on all your resources and their workloads.
ZENworks Patch Management ?
agent-based patch, vulnerability and compliance management system. Novell ZENworks® Patch Management provides rapid patch management, allowing you to proactively manage threats by automating the collection, analysis and
policy-based delivery of patches throughout your enterprise.
ZENworks Suite ?
automated, intelligent way to manage the
complex platforms and systems that make up today's IT environments. By
automatically applying and enforcing business policies, ZENworks dynamically
manages your IT resources based on user and device identities.
ZENworks 7 Suite includes: ?
■ Desktop Management
■ Server Management
■ Handheld Management
■ Linux 7 Management
■ Asset Inventory
■ Data Management
■ Instant Messenger
■ Software Packaging
■ Personality Migration
■ Patch Management
Components of SUSE Linux Enterprise Server?
■ SUSE Linux Enterprise Server
■ SUSE Linux Enterprise Desktop
■ SUSE Linux Enterprise Real Time
■ Integrated Stack for SUSE Linux Enterprise
■ SUSE Linux Enterprise Thin Client
■ SUSE Linux Enterprise Point of Service
■ Novell® Customer Center
SUSE Linux Enterprise Real Time ?
A Linux server tuned for high performance and optimized for transactions per second.
Integrated Stack for SUSE Linux Enterprise ?
An easy-to-deploy, integrated
server stack that can be used as a file and print server, as a complete Web application and database server, or as both, depending on customer needs.
SUSE Linux Enterprise Thin Client ?
The only enterprise-quality Linux
solution that provides packaged thin-client images and easy customization and management of images.
SUSE Linux Enterprise Point of Service ?
integrated Linux
Point-of-Service environment.
features and benefits available with SUSE Linux Enterprise Server: ?
■ Xen Virtualization
■ Security with AppArmor
■ Systems Management
■ Compatibility with Windows
■ Compatibility with SAP Applications
■ High-Availability Storage
■ Cost-Effective SAN
■ World-Class Support
■ Account Management
Networking services provided by Novell Open Enterprise Server are: ?
- File and Storage
- High-Availability Services
- Management Services
- Productivity and Networking Services
File and Storage ?
■ Novell iFolder
■ iSCSI
■ Novell NetStorage
■ Novell Storage Services
■ Dynamic Storage Technology
■ Distributed File Services
■ Novell Archive and Version Services
iSCSI ?
iSCSI offers a low-cost alternative to Fibre Channel storage area networks (SANs).
Novell NetStorage ?
Using Novell NetStorageTM you have secure Internet-based
access to all files and folders stored on Novell Open Enterprise Server 2.
Novell Storage Services ?
Novell Storage Services provides added levels of file access security and ensures that authorized users can access and view only the files and folders they need.
Dynamic Storage Technology ?
categorizes
unstructured data as active or stale, based on customer policies, and directs the stale data to less expensive backup devices.
Distributed File Services ?
can create
a single virtual file system that spans multiple machines, thus maximizing the use and performance of storage resources.
Novell Archive and Version Services ?
allows individual users to instantly restore previous versions of modified, renamed or deleted network files.
High-Availability Services ?
■ Novell Clustering
■ Business Continuity Clustering
Management Services ?
■ Server Health Monitoring
■ Linux User Management
■ Novell iManager
■ Novell Identity Manager 3.5 Bundle Edition
■ Novell Customer Center Integration
Server Health Monitoring ?
Because Novell Open Enterprise Server 2 supports server-health monitoring and the Common Information Model (CIM), quick
assessments and detailed analyses are available for memory, operating systems,
processes and threads, the network, and central processing units.
Linux User Management ?
helps you to centrally manage your Linux user profiles while granting users easy access to
Linux resources.
Network Security with Novell Modular Authentication Service (NMAS) ?
Novell Modular Authentication Service (NMAS) is advanced authentication technology. It allows Open Enterprise Server to support dozens of authentication
methods.
OpenOffice.org — Novell Edition
word processor, presentation and
spreadsheet applications, an HTML editor, and a drawing tool
Minimum system requirements for SLES 10 ?
❑ 256 MB RAM
❑ 500 MB hard disk space for software
❑ 500 MB hard disk space for user data
Recommened System requirements ?
❑ 512 MB to 3 GB RAM
❑ 4 GB hard disk space
❑ Network interface
Hardware compatibility of SLES 10?
supports most enterprise hardware for servers. It also supports hardware for desktops. Some laptop computer hardware might not be compatible with SUSE Linux Enterprise Server 10.
Where can you verify SLES 10 hardware compatibility ?
http://www.novell.com/partnerguide/section/481.html
Default File System for SLES 10 ?
Reiser
It is easier to configure ____ or ___ during installation.
Software RAID or Logical Volumes (LVM)
To increase the security of your system, make sure you install only required _____ on
your computer.
services
What are the boot options when booting from the SLES 10 DVD ?
■ Boot from Hard Disk
■ Installation
■ Installation - Local APIC Disabled
■ Installation - ACPI Disabled
■ Installation - Safe Settings
■ Rescue System
■ Memory Test
Default Runlevel?
5 which offers full networking capabilities and GUI?
Network Manager ?
applet that tries to manage the
configuration of your network automatically. This is useful if your computer
often changes the network location (e.g., notebooks with wireless LAN).
Is the firewall activated by default ?
Yes
Is the SSH port bloacked by default ?
Yes
Four types of Firewall zones available?
Internal, External, Demilitarized or No Zone (all traffic blocked).
NIC's can be set to activate at ____, _____, _____ or _____.
At Boot Time, On Cable Connection, On Hotplug, Manually, or Never.
The purpose of a CA (Certificate Authority) is to ?
guarantee a trust relationship among all network services communicating with each other.
You can run an ____ server on your host to provide a central facility managing a range of configuration files.
LDAP
Typically, an LDAP server handles user account data, but with SUSE Linux Enterprise Server, it can also be used for ___, ___, and ____ ?
mail-, DHCP-, and DNS-related data.
Is a certificate authority created by default?
Yes
An LDAP server is set up during the installation, but it is ___.
not started.
User Authentication can be done by what four methods?
■ Local (/etc/passwd).
■ LDAP.
■ NIS.
■ Windows Domain
If Local user authentication is used, it is managed by what file?
/etc/passwd
If LDAP user authentication is used, account data is managed by ?
LDAP server
If NIS user authentication is used, account data is managed by ?
NIS server
If a Windows Domain is used for user authentication, account data is managed by ?
centrally by Windows or a
Samba server. Samba normally allows authentication in a Windows environment.
YaST user interface can appear in what two modes ?
■ ncurses. Text mode
■ QT. Fully graphical mode
yast2 on command, will start the __ ___?
yast GUI.
yast on command, will start the?
text version of yast
You can list the available YaST modules from a terminal window with the ___ or ____ command.
yast -l or yast --list
yast sw_single ?
Will start the Software installation module.
yast -i package.rpm
Will install a software package without any dialogs.
yast --help
Display list of Yast options.
Popular linux/Unix shells ?
■ The Bourne shell (/bin/sh; symbolic link to /bin/bash)
■ The Bourne Again shell (/bin/bash)
■ The Korn shell (/bin/ksh)
■ The C shell (/bin/csh; symbolic link to /bin/tcsh)
■ The TC shell (/bin/tcsh)
Login Shell ?
started whenever a user logs in to the system
Non-login shell?
any shell started from within a running shell.
Bash shell allows you to press the ___ key to autocomplete the rest of the command or file name.
Tab
"history" command is used to display?
commands entered in terminal window by user.
Two features make working with the bash shell more powerful?
Variables and Aliases
Shell variables, on the other hand, are used to ____?
control the behavior of the shell itself.
Environment variables are used to ____?
control the behavior of a program that is started from a shell.
To display the value of a shell or environment variable, enter ___ ?
echo $variable
To set the value of a variable or to create a new variable, use the syntax ____
variable=value
Aliases allows you to create?
shortcuts for commands and their options or to create commands with entirely different names.
whenever you enter the dir, md, or ls commands on a SUSE Linux
Enterprise Desktop 10, you will be using
Alias. Ex. dir = ls -l
"type" command can be used to ?
To see whether a given command is an alias for something else
Aliases are defined with the ___ command and can be removed
with the ____ command.
alias, unalias
How to create a alias?
alias aliasname="command options"
An alias created using "alias aliasname="command options"" is only valid for the ___ ___ and will not be inherited by subshells.
current shell
How to make a alias you create persistent ?
the ~/.alias file can be used for personal aliases defined by each user.
What five services available with OES2?
- File and Storage Services
- High-Availability Services
- Management Services
- Productivity and Networking Services
- Identity and Security Management
What File and Storage services are available in Novell Open Enterprise Server 2?
- Novell iFolder
- iSCSI
- Novell NetStorage
- Novell Storage Services
- Dynamic Storage Technology
- Distributed File Services
- Novell Archive and Version Services
Novell iFolder
lets you store, access, organize, and manage your files from
anywhere, anytime. powerful, encrypted online file synchronization and online transfer tool gives you worry-free security, ensuring that user files are always safe, secure and up to date.
Does iFolder Track and Log changes made to iFilder while users are offline?
Yes, then synchronizes changes when they go online.
If your local machine is damaged or lost, you can recover your files from the ____?
main iFolder server
iSCSI?
emerging standard for SCSI block storage protocols networked over high-speed TCP/IP networks.
iSCSI lets you create a low-cost _______. iSCSI provides significant cost savings when compared to the costs required to create a fibre channel SAN.
Storage Area Network
(SAN) using commodity high-speed Ethernet hardware
NetWare iSCSI software is divided into two parts:
■ Initiator software
■ Target software
iSCSI Initiator software is ____ and ____ on servers in the SAN that will be used to access shared storage.
installed and configured
Initiators can be ____ servers. Initiators use the iSCSI protocol to communicate with an iSCSI storage server or target over a TCP/IP network.
cluster
Target software ?
Installed on a NetWare server and provides access to shared
disks through the iSCSI protocol.
iSCSI target software enables the server on
which the software is installed to function as a ____ _____.
Disk Controller for the shared disk
system.
iSCSI solutions include the following: 5 items
■ Direct-attached-storage-to-SAN migration
■ Site-to-site migration
■ Distance replication, including disaster recovery and geographic data caching
■ Serverless backup
■ Low-cost clusters
iSCSI can support ___-node server clusters.
32
NetStorage ?
provides secure Internet-based access to files and folders on Linux and
NetWare® servers on your network using either a browser or Microsoft Web Folders
(Microsoft's implementation of WebDAV).
Is Internet-based access of files through NetStorage secure?
is as secure as accessing files from within the network.
How can files and folders be accessed with NetStorage?
via either a browser or Network Neighborhood and Microsoft Web Folders; no Novell ClientTM software is required.
Users can securely access files from any IP-enabled machine via _____ and ____.
Secure Sockets
Layer (SSL) and Secure Hypertext Transfer Protocol (HTTPS).
NetStorage supports popular _____, _____, and ____ Web browsers.
Windows, Linux, and Macintosh
NetStorage is installed on one NetWare or Linux server that acts as a ____ ___ server.
Middle Tier (also known as XTier) server.
What program is used to setup a Middle Tier server?
Novell iManager
How does a Middie Tier server appear to users?
Internet Web server and can be accessed with either a Web browser or Microsoft Web Folders.
NPS ?
Novell Portal Services
Novell Storage Services (NSS)
64-bit file system for Linux and NetWare that can manage a virtually unlimited number of file objects.
NSS features?
■ A journaling file system.
■ Encrypted volume support.
■ Access control and visibility management using the Novell trustee model.
■ An unlimited number of NSS volumes.
■ Lower memory requirements.
■ Pools of storage that span multiple devices and support dynamic resizing to grow the pool and volumes.
■ Pool snapshots that capture point-in-time versions of files in the pool.
■ Software RAID support.
■ Multiple server activation prevention (MSAP).
■ Up to 4 billion (10E9) files in a single directory.
■ Faster access to data, regardless of file size or volume size.
■ Directory and user space restrictions.
■ Salvage support for deleted volumes and files.
■ Data compression.
NSS recognizes physical and logical devices, up to ____.
2 Terabytes.
How many volumes can a NSS pool contain?
unlimited. If the pool needs to span devices, the volumes
automatically span the devices as well.
Novell Storage Services, you can deliver a robust and reliable
storage solution based on standard ____ ____ ____ protocols.
Network Attached Storage (NAS)
Network Attached Storage (NAS) allow Unix and Linux users can ___ ____ with Windows and Mac users.
share files
Novell® Dynamic Storage Technology (DST) for Novell Open Enterprise Server 2
(OES 2) Linux is an__...
information life-cycle management technology that uses a policy-based approach for relocating data between two Novell Storage ServicesTM
(NSS) volumes located on different devices. DST transparently provides a unified
view of the file tree to users.
DST categorizes ______ _____ as active or stale, based on customer policies, and
directs the stale data to less-expensive backup devices. This saves valuable space on
your most expensive and highest-performing storage devices.
unstructured data
NetWare® Core ProtocolTM (NCPTM) Server ?
is a service that allows you to define NCP volumes as share points on traditional Linux file systems such as Ext3 and Reiser.
Novell Distributed File Services (DFS) ?
simplifies the location and management of file data for administrators and end users. With DFS, you can create a single virtual
file system that spans multiple volumes to maximize the use and performance of storage resources.
With DFS, Large volumes can be split into two (or more) volumes, and the resulting volumes can be backed up separately as required. You can split a volume at any _________, making a new NSS volume, without changing the _____ _____ to files.
directory, logical paths
DFS preserves the logical file organization by maintaining a ______ _____ ______ (VLDB) for all volumes.
Volume Location Database
When you move a Novell Storage Services (NSS) volume to a new volume in a different pool, the ___ ___ ___ helps redirect queries to the new location so users and applications can always find their files, even when
directories change.
Volume Location Database. pg186
The management context can have ___ or ___ replicas of VLDB services.
One or Two VLDB services.
The
servers that host replicas of the VLDB service can exist ______ in the management
context
anywhere
DFS places a ______ file at the source location in place of the old directory. The _____ contains a hint about the new location of the data. When a user attempts to access the data, DFS looks up the location of the destination volume in the VLDB, and then automatically redirects the query.
Junction
DFS can also provide a _______ _________ if you are moving NSS volumes from NetWare to OES Linux. You can stay flexible and migrate data at your own pace.
Migration Path
Novell ______ and ______ Services can archive user network files that are stored on
Novell Storage Services volumes on OES 2 Linux servers.
Archive and Version Services
The archive server runs Novell Archive and Version Services for OES 2 Linux, which includes the following services:
■ User capability to search and restore file versions
■ Versions of files based on configurable epoch intervals
■ Non-intrusive backup of files
■ Full access control
■ Workgroup-based access
■ Increased productivity
An ______ server and the _____ reside in the same Novell eDirectory tree.
Archive server and the Volumes