Which of the following lines should be added to smb.conf to use authenticate users against the Kerberos domain
Which of the following lines should be added to smb.conf to use authenticate users against the
Kerberos domain bc.ep.kerberos.biz?
What file or utility is used by normal users to configure the cron daemon?
CORRECT TEXT
What file or utility is used by normal users to configure the cron daemon?
Type in the name of the tool only
Which backend must be included in the smb.conf’s passdb backend parameter in order for users to authenti
Which backend must be included in the smb.conf’s passdb backend parameter in order for users to
authenticate against an LDAP directory?
What file with full path is used to set the location to query for hostname resolution outside of the local sys
CORRECT TEXT
What file with full path is used to set the location to query for hostname resolution outside of the
local system?
Which component of the Samba suite allows Windows domain users to appear and operate as Unix users on a Unix m
Which component of the Samba suite allows Windows domain users to appear and operate as Unix
users on a Unix machine?
what can you do?
CORRECT TEXT
To immediately stop a DDOS attack from 10.1.1.128, what can you do?
Type the command with the necessary options and arguments.
which database file will winbind store its UID/GID/SID mappings?
If the idmap parameter is not specified in smb.conf, in which database file will winbind store its
UID/GID/SID mappings? (Enter only the filename, without a path)
how many host addresses are assignable?
CORRECT TEXT
With a Class C address, and a subnet mask of 255.255.255.0, how many host addresses are
assignable?
(Include ANY required options.)
What command will delete the user account joeuser from a Samba server. (Include ANY required
options.)
What command will most effectively track a network path problem?
CORRECT TEXT
What command will most effectively track a network path problem?