What action does the virsh restore command perform?
What action does the virsh restore command perform?
What does the following iptables rule accomplish: <code> iptables A INPUT s !127.0.0.0/8 p tcp dport 111
What does the following iptables rule accomplish:
<code>
iptables A INPUT s !127.0.0.0/8 p tcp dport 111 j DROP
</code>
How would Samba be instructed to limit the size of requests it will accept?
A software vendor states that their SMB client software may perform better if the maximum packet
size of SMB commands is limited to 32768 bytes. How would Samba be instructed to limit the size
of requests it will accept?
A private OID should be obtained for a company when
A private OID should be obtained for a company when
Which command could be used to generate an ID that uniquely identifies the virtual machine in Xen?
Which command could be used to generate an ID that uniquely identifies the virtual machine in Xen?
What is wrong with the following configuration?
The local system administrator has created a configuration entry for apache version 2 that isn’t
working. What is wrong with the following configuration?
<code>
<Location /members>
AuthName Members
AuthType Basic
AuthUserFile /www/passwd
</Location>
</code>
What does the ! mean when used at the beginning of a line in the username map file?
What does the ! mean when used at the beginning of a line in the username map file?
Which of the following switches for the ldapsearch command makes sure that search referrals are followed?
Which of the following switches for the ldapsearch command makes sure that search referrals are followed?
Which one of the following options represent a valid declaration of a backend server with HAProxy?
Which one of the following options represent a valid declaration of a backend server with HAProxy?
which directives are used to restrict access based on host/domain name and IP address?
In apache configuration which directives are used to restrict access based on host/domain name and IP address?