total descendants:: total children::6 4 ❤️
|
perlicka - mam vybrat nejakych sys adminkov pre bezne veci (apache, mysql, nejaka sietarina) v mensej firme. narychlo som zbuchal test (nizsie) ktory som povazoval za celkom laskavy, ziadna brutalita, len jednoduchy zakladny prehlad. zatial nim presiel len 1 clovek, zvysok kandidatov mal strasne vysledky. zaujimalo by ma co si o nom myslite vy. 1) give an example of at least two opensource MTA systems 2) give an example of at least two opensource antispam systems which could be integrated into MTAs 3) list and briefly describe basic subversion or cvs commands for: - adding content - removing content - making the changes permanent - synchronization with local working copy - checking the status of local working copy 4) in which configuration file would you be looking for users allowed to use the sudo command? 5) how would you create software raid array under linux systems? how would you add disks into it and how would you check the array for the current status? 6) what is the typical destination for dhcp traffic log in common linux systems? 7) describe the dhcp messages. specify the correct order of common dhcp communication. 8) briefly describe the expression "ethernet bounding" 9) assign port numbers which are usually used for following server side services: ftp, ssh, smtp, pop3, imap, http, https 10) how would you repair a linux system once it gets broken? 11) what is the major difference between GPL and BSD licence? 12) briefly explain following types of attacks and give example of prevention method for each of them: - syn flood - DoS - man in the middle - phishing 13) briefly describe the major differences between DES, 3DES and RSA 14) briefly describe the purpose of following apache directives: - KeepAlive - AllowOverride - ServerRoot - DocummentRoot - CharsetDefault - HostnameLookpus 15) what is the purpose of mod_rewrite in apache server? 16) what are the major differences between following distributions: - freebsd - gentoo - debian - knoppix 17) explain the purpose of DNAT and PAT 18) how would you check for open ports on your system 19) briefly describe "SUID" and "SGID" expressions 20) give example of an intrusion detection system 21) what permissions will be assigned to a file after issuing a command "chmod 655"? |
| |||||||||||||||||||||||||||||