Linux Test Paper for Linux Admins and Linux Learning Students
[1]Solve and brief: 10*5=50 Marks
(a)Explain all the possible commands to lock/unlock,enable/disable and secure a user in linux.
(b)What are all possible way to secure your grub?
(c)How to change hashing algorithm of your linux machine,show it by implementing it on one of your linux users.
(d)How to secure your terminal?how to lock/unlock your terminal?How to make an user automatically login on terminal 16 and how you will go to terminal 16?
(e)Draw Flow chart Diagram showing data distribution With Basic Commands of RAID 601.
(f) How to apply usb security in Linux?
(g)show atleast three different methods to lock and unlock users in linux?
(h)show avg antivirus setup,configuration with it,s configuration file in Linux Server.
(e)Show malware Detection tool setup and malware detection method in Linux Machines.
(g)Show rootkits scanning process on Linux Machine.
(h)Show how to Audit a Linux Server
(e) Explain the Files/Folders with Path where Linux Store it’s Log Files.
(g)Show Implementation of TCPWRAPPER to allow a certain network for all service but block one ip of that network from accessing ssh.
(h)Block ip 1.0.0.1 from accessing telnet service using iptables.
(i)How to setup autologin in a Linux Server?
(j)Why a linux machine always getting rebooted everytime we on it? how you will fix this issue?
[2]Solve this Problem: 40 Mraks
We have eight user A B C D E F G and H, and user A and B belongs to AB group whereas user C and D belongs to CD group.We have a file inside/ home/tiwary/rasagulla directory name satish.txt whose user owner is E and whose group owner is AB. User owner of the file have full permission to read write and execute and group owner have permission to read write except user B who has only read permission.And others have only read permission except user H who have read write and execute permission.Group CD has read permission except user D who have write permission too.But non of user have right to delete the file.And the file is protected with a password.
Note1:This file resides in a folder where a swap file is also resides side by side. And these both files resides on a logical volume “lv11” and this lv11 resides on a volume group vg00.
Note2: initial there was two volume group vg00 and vg11,and after merging these two volume groups we have now one and final volume group left named vg00.
Note3:volume group vg00 resides on a RAID5 device named /dev/md5 which is created over loop devices.
[3] Configure IP Based with space 1GB,Name Based with space 500MB and PORT Based Virtual Hosting with 400MB space with Redundancy and with easy access on client machine through NFS.
30 Marks
[4] show implementation of following: 30 Marks
- IP based Security
- Network Based Security
- PORT based Security
- Connection Based Security
- Time Based Security
- Bind security
- For Telnet and TFTP Server.