Which of the following steps should be followed when configuring a slave slapd server?
Which of the following steps should be followed when configuring a slave slapd server?
(Choose three.)
Which of the following configuration settings specify that keepalived is to use the round robin algorithm?
Which of the following configuration settings specify that keepalived is to use the round robin
algorithm?
Which of the following options could resolve the problem?
A user is attempting to connect to a remote host via SSH and following message is displayed:
Host key verification failed.
Which of the following options could resolve the problem? (Select TWO correct answers)
How can it the checked that a machine was successfully added to an Active Directory environment?
How can it the checked that a machine was successfully added to an Active Directory
environment?
(Specify the module in Perl’s Module)
The _______ Perl module gives the programmer the ability to work with LDIF files in perl. (Specify
the module in Perl’s Module)
which one of the following modes should be used?
In order to use HAProxy to balance incoming connections to a pool of email servers, which one of
the following modes should be used?
Where is the global list of known SSH host keys located?
Where is the global list of known SSH host keys located? (Supply the full path and filename)
CORRECT TEXT A default user profile can be stored in a subdirectory of profiles/ called ______.
CORRECT TEXT
A default user profile can be stored in a subdirectory of profiles/ called ______.
Fill in the access control level setting to prevent users from retrieving passwords:
CORRECT TEXT
Below is an ACL entry form a slapd.conf file. Fill in the access control level setting to prevent users
from retrieving passwords:
<code>
access to attrs=impassword,ntpassword
by dn=”cn=smbadmin,dc=samplenet” write
by * ___________
</code>
How can the risk of UID/GID inconsistencies be avoided across UNIX/Linux systems that are sharing information
How can the risk of UID/GID inconsistencies be avoided across UNIX/Linux systems that are
sharing information over protocols other than SMB/CIFS (eg. NFS)?