T.Y. B.Sc. (IT) : Sem. V Administration Time : 2½ Hrs.] Prelim Question Paper [Marks : 75

Q.1 Attempt any TWO: [10] Q.1 (a) Explain Linux distributions. [5] (A) Linux Distributions Although there is only one standard version of Linux, there are actually several different distributions. Different companies and groups have packaged Linux and Linux in slightly different ways.

Red Hat Linux [Any five distribution  5 marks] Red Hat Linux is currently the most popular Linux distribution. As a company, Red Hat provides software and services to implement and support professional and commercial Linux systems. Red Hat freely distributes its version of Linux under the GNU Public License. Red Hat generates income by providing professional level support, consulting, and training services. Red Hat originated the RPM package system used on several distributions, which automatically installs and removes software packages.

Red Hat maintains an extensive library of Linux documentation that is freely accessible online. On its Web site, you can link to its support page, which lists the complete set of Red Hat manuals, all in Web page format for easy viewing with any Web browser. Red Hat offers several commercial products and services for business and e- commerce solutions.

Mandrake Mandrake Linux is another popular Linux distribution with many of the same features as Red Hat. It focuses on providing up-to-date enhancements and an easy-to-use installation and GUI configuration.

SuSE Originally a German language-based distribution, SuSE has become very popular throughout Europe and is currently one of the fastest growing distributions worldwide. Vidyalankar Debian Debian Linux is an entirely noncommercial project, maintained by hundreds of volunteer programmers.

1 Vidyalankar : T.Y. B.Sc. (IT)  Linux

Its aim is to enhance Linux with new and improved applications and implementations.

Caldera Caldera OpenLinux is designed for corporate commercial use. Caldera has organized its OpenLinux distribution into several different packages, each geared to different markets. These include the eDesktop package, which is designed for basic workstation operations, and the eServer package, which is designed for Linux servers.

Caldera also offers a line of commercial and proprietary Linux packages.

Slackware is available from numerous Internet sites, and you can order the CD from Walnut Creek Software. The Slackware distribution takes special care to remain as closely Unix compliant as possible.

TurboLinux TurboLinux provides English, Chinese, and Japanese versions of Linux. It includes several of its own packages, such as TurboPkg, for automatically updating applications.

Q.1 (b) How loader works? State the difference between grub and lilo. [5] (A) Grub : Grub stands for Grand Unified Bootloader. The bootlader is the software program. If you have multiple kernel images installed on your system, you can choose which one to be executed. GRUB displays a splash screen, waits for few seconds, if you don’t enter anything, it loads the default kernel image as specified in the grub configuration file. (grub.conf in /boot) GRUB has the knowledge of the filesystem (the older Linux loader LILO didn’t understand filesystem). Grub configuration file is/boot/grub/grub.conf (/etc/grub.conf is a link to this). [Working of loader 3 marks and difference 2 marks (4 points)]

GRUB LILO GRUB stands for GR and Unified Stands for Linux Loader VidyalankarBootloader. GRUB supports an unlimited number LILO supports only up to 16 of boot entries. different boot selections; GRUB can boot from network. LILO cannot boot from network.

2 Prelim Paper Solution

There is no need to change GRUB LILO must be written again every when the configuration file is time you change the configuration changed as GRUB is dynamically file. configurable. GRUB has an interactive command LILO does not have an interactive interface. command interface. GRUB has the knowledge of the file LILO doesn’t have the know ledged system. file system.

Q.1 (c) State any 5 linux supported file systems and explain ext3 and ext 2. [5] (A) 5 Linux Supported File System [1 mark] 1. ext3 2. ext2 3. Reiser 4. FAT 5. NTFS

ext2(non-journaling file system) [2 marks]  xt2 stands for second extended file system.  ext2 does not have journaling feature.  On flash drives, usb drives, ext2 is recommended, as it doesn’t need to do the over head of journaling.  Can handle file systems up to 4 TB  It supports long file names up to 1012 characters.  In case user processes fill up a file system, ext2 normally reserves about 5% of disk blocks for exclusive use by root so that root can easily recover from that situation.

Ext3 [2 marks]  Ext3 stands for third extended file system.  Starting from Linux Kernel 2.4.15 ext3 was available.  The main benefit of ext3 is that it allows journaling.  Journaling has a dedicated area in the file system, where all the changes are tracked. When the system crashes, the possibility of file system corruption is less because of journaling. (If no journaling, then fsck commend(file system consistency check) is used to check for the corrupted file and to repair that file). Vidyalankar Under ext2, when a file system is uncleanly mounted, the whole file system must be checked. This takes a long time on large file systems. ext3 keeps a record of uncommitted file transactions and applies only those transactions when the system is brought back up.

3 Vidyalankar : T.Y. B.Sc. (IT)  Linux

 Maximum individual file size can be from 16 GB to 2 TB  Overall ext3 file system size can be from 2 TB to 32 TB  You can convert a ext2 file system to ext3 file system directly (without backup/restore).

Q.1 (d) Explain RAID levels with diagram. [5] (A) RAID :  Is an acronym for Redundant Array of Independent Disks.  Used for maintaining copy of the data.

There are two types of RAID – hardware RAID and Software RAID. Hardware RAID – in H. RAID, the disks have their own RAID controller with built in software that handles RAID disk setup. The controller is a card in one of the system’s expansion slots. Ot it may be built onto the system board. The O/S does not control the RAID level used, it is controlled by the hardware RAID controller.

Software RAID – there is no RAID controller card. The O/S is used to set up a logical array and the O/S controls the RAID level used by the system.

Six RAID levels are commonly used. The three most commonly used RAID levels are  RAID level 0 – stripping [½ mark] This level requires at least two disks and uses a method called striping that writes data across both drives. There is no redundancy provided by this level of RAID, since the loss of either drive makes it impossible to recover the data. This level does give a speed increase in writing to the disks.

Vidyalankar

4 Prelim Paper Solution

 RAID level 1 – Mirroring [½ mark] This level requires at least two disks and uses a method called mirroring. With mirroring, the data is written to both of the drives. So, each drive is an exact mirror of the other one and if one fails the other still holds all the data. There are two variants to level 1 with one variant using a single disk controller that writes to both disks. The other variant uses two disk controllers, one for each disk. This variant of RAID level 1 is known as duplexing.

 RAID level 2 – Error Checking and Correction [1 mark] Requires minimum 3 disks. RAID 2 adds error checking and correcting checksums to RAID-1. ECC is Error correcting code in which each data signal confirms to specific rules of construction so that departures from this construction in the received signal can generally be automatically detected and corrected. RAID 2

A1 A2 A3 A4 A A A p1 p2 p3 B1 B2 B3 B4 Bp1 Bp2 Bp3

C1 C2 C3 C4 Cp1 Cp2 Cp3 D1 D2 D3 D4 Dp1 Dp2 Dp3

Disk 0 Disk 1 Disk 2 Disk 3 Disk 4 Disk 5 Disk 6

 RAID level 3 – Byte-Level Striping with Parity Disk [1 mark] Requires minimum 3 disks. It does striping, like RAID-0, but at a very Vidyalankarsmall granularity. It also adds parity disks which helps in error detection and recovery.

5 Vidyalankar : T.Y. B.Sc. (IT)  Linux

RAID 3

A1 A2 A3 Ap(13)

A4 A5 A6 Ap(46) B1 B2 B3 Bp(13) B4 B5 B6 Bp(46)

Disk 0 Disk 1 Disk 2 Disk 3

 RAID level 4 – Block-Level Striping with Parity disk [1 mark] requires minimum 3 disks. It attempts to add error checking and recovery to RAID-3 by doing block level striping with the addition of a single parity disk. RAID 4

A1 A2 A3 Ap B1 B2 B3 Bp

C1 C2 C3 Cp D1 D2 D3 Dp

Disk 0 Disk 1 Disk 2 Disk 3

 RAID level 5 – Block-Level Striping with Distributed Parity [1 mark] It requires at least three disks and uses striping to write the data across the two disks similarly to RAID 1. But unlike 1, this level uses the third disk to hold parity information that can be used to reconstruct the data from either, but not both, of the two disks after a single disk failure. RAID 5

A1 A2 A3 Ap B1 B2 Bp B3 C C1 Cp C2 3 Dp D1 D2 D3

Vidyalankar

Disk 0 Disk 1 Disk 2 Disk 3

The information of system’s RAID configuration is stored in /etc/traidtab .

6 Prelim Paper Solution

Q.2 Attempt any TWO: [10] Q.2 (a) How to manage rc scripts using chkconfig? [5] (A) To configure any software package to work at boot time use this command with following options: [Each point 1 mark] 1. To check all packages working at which run levels #chkconfig –list 2. To check whether package is working at boot time #chkconfig –list packagename 3. To reset run levels for any package #chkconfig –levels 0123456 packagename OFF 4. To set run levels for any package #chkconfig –levels 23456 packagename ON

Q.2 (b) Configure a network for class c and also set ip for default [5] gateway and DNS. (A) Setting IP for the machine: [3 Mark] #ifconfig etho 192.168.2.1 netmask 255.255.255.0 broadcast 192.168.2.255 Setting IP for the Default Gateway: [1 Mark] #route add default gw 192.168.2.3 Setting IP for the DNS: [1 Mark] #vi /etc/resolv.conf Set two IP and save the file

Q.2 (c) What is the process to create grub boot floppy? [5] (A) (a) Boot a Linux with Grub support and log in as root or in superuser mode (su followed by the password) [1 mark] (b) Format the floppy in MsDOS (or Ext2) by typing "mkmsdosfs -F32 /dev/fd0" after inserting a floppy into the drive. [1 mark] (c) Create a mounting point, mount the floppy and make the necessary directories to store the files at a designated location where Grub will search for them #mkdir /mnt/fd0mount /dev/fd0 /mnt/fd0 #mkdir /mnt/fd0/boot #mkdir /mnt/fd0/boot/grub (d) Copy all the necessary files in /boot/grub directory of the booted Linux to the mounted fd0 # cd /boot/grubtar [2 mark] Vidyalankar(e) To remove or erase the content of /mnt/fd0/boot/grub/menu.lst. Grub will boot to Grub prompt if there is no instruction in the menu.lst or the menu.lst is empty or unavailable. If the System Rescuse CD is used its menu.lst has already been emptied.

7 Vidyalankar : T.Y. B.Sc. (IT)  Linux

(g) Reboot the Linux, again log in as root or in superuser mode, drop into command prompt and activate Grub by just type grubroot (fd0)setup (fd0) Grub will search the stage1 and stage2 files in the floppy. If they exist Grub will install them in the boot sector. [1 mark]

Q.2 (d) What are the security considerations for NFS? [5] (A) Authentication: Client should prove that it is a valid user through authentication. [Every point 1 mark] Encryption and decryption: Since files are traversing in a network, there is possibility of an attack, so convert the file in cipher text using encryption and decryption technique. Hard Mooting and soft mounting: The process of requesting a server continuously till client gets the file is called as hard mounting. The process of requesting a server periodically for some attempts is called as soft mounting. Cross Domain Mounting: Two machines mounting the files of each other is known as Cross Domain Mounting Root Squash: Squashing the rights of root user of client for the exported file is called as Root Squash. Per User and Per Host: It is possible to provide security w.r.t machine or user.

Q.3 Attempt any TWO: [10] Q.3 (a) Explain the NTP utility programs. [5] (A) [Any 5 program 5 marks]

PROGRAM DESCRIPTION ntpdate Sets the system date and time via NTP ntpdc Controls the NTP daemon, ntpd ntp-keygen Generates public and private keys for use with NTP ntpq Queries the NTP daemon ntpsim Provides NTP simulation for development and testing ntptime Displays the time variables maintained by the Linux kernel ntptrace Traces a chain of NTP servers back to the primary source tickadj Sets certain time variables maintained by the Linux kernel

Vidyalankar

8 Prelim Paper Solution

Q.3 (b) Write the configuration for accessing /data from linux machine. [5] (A) On Linux Machine: [4 marks] #mkdir /data #chmod 777 /data Edit samba configuration file and set WORKGROUP= samba, also make /data sharable with some users for e.g. abc.

On windows machine: [1 mark] Open My Network Places -> samba-> login as abc This makes /data sharable with windows.

Q.3 (c) State and explain any 5 parameters of squid.conf [5] (A) Squid.conf [Any 5 lines explanation 5 marks] 1. Chache  effective user  user : squid.conf 2. chache  effective user  group : squid 3. httpd_accer_with_proxy yes/No 4. httpd_accer_IP 5. httpd_accer_porl  50 6. httpd_accer_uses_host_hiodes  yes/No 7. httpd_access : allow all/cliny all

 line 1 & 2 Specifies name of squid.  Line 3 if yes. Squid is proxy with caching.chi.squid only proposy  Line 4 spceifies IP of caching  Line 5 specifies part of caching  Line 6 if yes. Clinet will be configure automatically, else manually.  Line 7 Specifies who is going to access squid.

Q.3 (d) Write a short note on squid. [5] (A) Providing Process Caching Server: (SQUID) [Diagram 2 marks and explanation 3 marks] SQUID is by default a process server but can also be used as a caching souses. For eg.

C1 S C4 Q U C2 C5 VidyalankarI D C3 C6

9 Vidyalankar : T.Y. B.Sc. (IT)  Linux

SQUID which maintains the caching recourses is responsible to cahce frequency vistted websites web pages to that the time is should from accessing the webpage. The caching resource is also because accelerates recourse (accel).

Q.4 Attempt any TWO: [10] Q.4 (a) Define zone and create a zone file for www.abc.com having Ip [5] 233.41.22.4 (A) Zone Definition: [2 marks] Zone “www.abc.com” IN { Type “Master”; File “abc.zone”; }

Zone File [3 marks] @ IN SOA www.abc.com ( 42; Serial 3H; Refresh 15M; Retry 2D; Expiry 3D); Minimum TTL IN A 233.41.2.4

Q.4 (b) Write Configuration steps of caching dns server [5] (A) 1. Install DNS package. # rpm  I bind  Output : bind verno installed. 2. Once DNS is installed, DNS configuration file “named.conf” will be created, which SHOULD having following definition. Zone “ . “ IN { Type “Hint”; File “named.ca” ; } [1 mark] 3. Make sure that, DNS cache has an entry to map local host to loopback. Vidyalankar 4. Make sure that /etc/nsswith.conf contain the following line to redirect the client. hosts: file dns 5. Make sure that / etc/hosts has the word “bind”

10 Prelim Paper Solution

6. Make sure that/etc/resolv.conf has IP of DNS. 7. Start the revises of DNS #revises bind starts [4 marks]

Q.4 (c) Give syntax and example of scp and sftp. [5] (A) Answer not given 1. ssh (Secure Shell): It is a replacement of telnet which connect a local m/s to a remote m/c through command terminal. The traffic between 2 m/c is incrupted and a virtual tunnel is created. [1 marks] 2. scp (Securce Copy) : It is a replacement of scp to copy a file from a local m/c to a remote m/c and vice versa. Syntart : # scp src dutn  e.g. 1 : Copy file it from a local m/c a remote m/c B/abc directory # scp fl.fxt B:/abc  e.g. 2: Copy a file f2 from remote m/c B/abc directory into local m/c /pq r directory. # scp B/abc/f2.txt/pqr  [2 marks] 3. sttp (secures ) : It is a replacement of file t transfer a file between client and a serves. Syntax : sttp src destn  Eg.1 : copy content of file it from local m/c remote m/c B/abc directory. Eg. 2: Copy contents of file from remote m/c B/abc directory into local m/c/pq directory. # step B/abc?f2.txt/[pqr/f2.txt [2 marks]

Q.4 (d) Explain the important files used by DNS server. [5] (A) /etc/nsswitch.conf [Any 5 for 5 marks] It tells the browser not to contact the DNS server directly, first check whether required entry is present in DNS cache

/etc/hosts It is DNS Cache

/etc/resolv.conf It contains IP of DNS servers

/etc/named.conf VidyalankarIt is general DNS Server Configuration File

/var/named/named.local It is used for mapping Loopback IP to Local Host

11 Vidyalankar : T.Y. B.Sc. (IT)  Linux

/var/named/named.ca It is DNS cache server configuration File

/etc/named.conf/zone It is used for forward mapping.

/etc/named.conf/reverse zone It is used for reverse mapping.

Q.5 Attempt any TWO: [10] Q.5 (a) How to configure user level ftp access? [5] (A) Answer not given [3 marks] The /etc/vsftpd/ftpusers file is the simplest to understand. It contains a list of user or account names, one per line, that are not allowed to log in using FTP. This file is used to increase security. For example, if a cracker somehow obtains the root password but (stupidly) tries to log in as root using FTP, the login attempt will fail. Notice that the filename is annoyingly counterintuitive: user accounts listed in this file are not permitted to log in to the system via FTP. In general, /etc/vsftpd/ftpusers is used to prevent privileged user accounts, such as root, from using FTP to obtain access to the system. The following code shows the default /etc/vsftpd/ftpusers file: root bin daemon adm Ip sync shutdown halt mail news uucp operator games nobody So, to prevent a user named bubba from using FTP to log in, or, rather, to prevent bubba from logging in to the system via FTP, add bubba to the end of /etc/vsftpd/ftpusers. In most cases, these default entries should be Vidyalankarsufficient, but if you install a software package, such as a database package, that requires one are more special user accounts, consider adding such special accounts to /etc/vsftpd/ftpusers in order to maintain strict limits on how the FTP server can be accessed.

12 Prelim Paper Solution

The /etc/vsftpd/user_list file serves a purpose similar to /etc/vsftpd/ftpusers, limiting FTP access, but it is more flexible. If you compare the two files, though, you see that the users listed in /etc/vsftpd/user_list are the same ones listed in /etc/vsftpd/ftpusers. So, what is the difference between the two files? /etc/vsftp/ftpusers unconditionally denies access to the system via FTP; /etc/vsftpd/user_list can be used to deny or permit access, depending on the value of the userlist_deny directive in /etv/vsftpd/vsftpd.conf. If userslist_deny is set to NO (that is, userlist_deny=NO), then vsftpd allows FTP access only to the users listed in /etc/vsftpd.user_list. If userlist_deny is set to YES (that is, userlist_deny=YES), no user listed in /etc/vsftpd/user_list will not be permitted to login via FTP. Such users will not even be prompted for a password. [2 marks]

Q.5 (b) Write the steps to configure postfix server. [5] (A) #rpm –i postfix [All steps compulsory for 5 marks] #service sendmail stop #chkconfig –levels 0123456 sendmail OFF #chkconfig –levels 2345 postfix ON #service postfix start #telnet localhost 25

Q.5 (c) Create a file f1.txt in /data and upload it on server whose ip is [5] 2.3.4.5. Also download file 2.txt from server. (A) #mkdir /data [All steps compulsory for 5 marks] #cd mkdir #touch f1.txt #ftp 2.3.4.5 Username: abc Password:*** ftp> put /data/f1.txt ftp>get f2.txt ftp>quit #

Q.5 (d) Explain protocols required to configure mail server. [5] (A) Tracing the Email Delivery Process VidyalankarThe usual email delivery process involves three components, a mail user agent, a mail transfer agent, and a mail delivery agent.

13 Vidyalankar : T.Y. B.Sc. (IT)  Linux

i) Mail User Agent (MUA) To be able to send mail, you or your users need a program called a mail user agent, commonly abbreviated as MUA and widely referred to as a mail client. The MUA provides users an interface for reading and writing email messages. Two types of MUAs are available: those that have a graphical user interface (GUI), such as Mozilla Thunderbird or KMail, and those that have a command line interface (CLI), such as Mutt or elm. Whether your MUA is a GUI or CLI, the functionality is the same. After composing an email message, the MUA sends it to a mail transfer agent (MTA), which transmits the message across the network.

ii) Mail Transfer Agent (MTA) A mail transfer agent, usually abbreviated as MTA, is the program that sends the message across the network.

The MTA reads the information in the To: section of the email message and determines the IP address of the recipient's mail server. Then the MTA tries to open a connection to the recipient's server through a TCP/IP port, typically port 25. DNS, the Domain Name System, plays a role in mail deliver, too. MTAs query a domain's DNS mail exchanger, or MX, record, to determine the host that is responsible for receiving mail for that domain. If the MTA on the sending machine can establish a connection to the destination MTA, it transmits the message using the Simple Message Transfer Protocol (SMTP).

In some cases, the message might not be immediately deliverable, so the sending MTA will store in a local queue and attempt retransmission after a set amount of time. In other cases, the receiving MTA might refuse delivery, causing the message to bounce and be returned to the sender's MUA.

iii) Mail Delivery Agent (MDA) After the MDA (sometimes referred to as a local delivery agent, or LDA) receives the message from the MTA, it stores the new message in the recipient's mailbox file. The mailbox file, known traditionally as the mail spool, is almost always identified by the recipient's username.

Introducing SMTP VidyalankarThe SMTP protocol can transfer only ASCCII text. It can’t handle fonts, colors, graphics, or attachments. If you want to be able to send these items, you need to add another protocol to SMTP, MIME. MIME stands for Multipurpose Internet Mail Extensions. MIME is implemented on top of the

14 Prelim Paper Solution

SMTP protocol and enables you to add colors, sounds, and graphics to your messages and still deliver them via SMTP. For MIME to work, you must have a MIME-compliant MUA (most are).

Understanding POP3 Two other protocols are part of the email process: Post Office Protocol version 3, known as POP3, and Internet Message Access Protocol version 4, known as IMAP4.

Without POP3 (or IMAP), and MUA and MTA can't communicate. That is, if you want to read your mail, need POP3 (or IMAP) to retrieve messages that arrive at your MTA while you're offline. POP3 uses the MTA's storage to hold messages until they are requested. When users want to check their email, they connect to the POP3 server and retrieve messages that were stored by the server. After retrieval, the messages are stored locally (that is, locally to the MUA) and use the MUA on your PC to read them at your leisure.

Q.6 Attempt any TWO: [10] Q.6 (a) Write a code to host three websites with same ip [5] (A) Write the following code in httpd.conf NameVirtualHost 192.168.2.1:80 ServerName www.a.com DocumentRoot /var/www/a/html DocumentIndex home.html [2½ marks] ServerName www.b.com DocumentRoot /var/www/b/html DocumentIndex home.html ServerName www.c.com DocumentRoot /var/www/c/html DocumentIndex home.html [2½ marks] Vidyalankar

15 Vidyalankar : T.Y. B.Sc. (IT)  Linux

Q.6 (b) Explain rpm command with its options [5] (A) Rpm stands for red hat package manager which can be used with different options [Any 5 options for 5 marks] To check which all packages are installed use –qa #rpm -qa To check whether specific package is installed or not use –q #rpm –q packagename To install specific package use –i #rpm –i packagename To update the package use –U #rpm –U packagename To remove the package use –e #rpm –e packagename

Q.6 (c) Why the name apache for Web server? State the difference [5] between apache 1.0 and apache 2.0. (A) Apace 1.0 [2½ marks] 1. Apache 1.0 makes the use of monatomic process model to handle the traffic. 2. As the traffic increases, master web server mail creates child server process (CSP). This is called as sparing the server. 3. When the child server process gets overloaded due to many traffic master server creates are more child server process. (max 2sc CSP) 4. When the traffic is reduced. 5. Master server will kill child server process. For eq.

MASTER WEB SERVER

Csp1 Csp2 Csp2SC

 CSP : Child Server Process Monatomic Process Model Vidyalankar Disadvantage: Heavy weight technique spawning and Rilling requires huge rescores

16 Prelim Paper Solution

Apache 2.0 [2½ marks] 1. Apache 2.0 makes the use of multi processing model (mpm) 2. As the traffic increases, master web server creates child server process which in two creates child threads. 3. As the traffic is decreased, the child threads and when child server process will be Rilled. E.g. Multiprocessing model (mpm)

Master with

CSP1 CSP2 CSP256

CT CTM CT CTM

 CSP : Child Server Process  CT : Child Thread Advantage : Light weight technique, spawning and Rilling threads requires less require resources.

Q.6 (d) Explain useradd command with options [5] (A) This command adds user to the system. [Any 5 options for 5 marks] Syntax: #useradd [-c] [-d] [-e] [-f] [-g] [-G] [-p] [-s] [-u] [-n] [-r] username Options:  C: comment  D: home dir  E: Account expiration  F: days after which password expires  g: primary group  G: Supplemental group  P: password  S: Shells  U:uid Vidyalankar R: acc but no dir is assigned E.g. #useradd abc

17 Vidyalankar : T.Y. B.Sc. (IT)  Linux

Q.7 Attempt any THREE: [15] Q.7 (a) Explain swap partition [5] (A) Swap partition [All points compulsory for 5 marks]  As the disk is much slower than RAM, the system’s performance is slower when the has to perform a lot of paging. Virtual memory enables one to run programs using swap partition that one otherwise could not run.  It is used for virtual memory to hold data that is too large to fit into system RAM. The swap partition should be at least 32MB or two times the system’s RAM, whichever larger.

Q.7 (b) Explain mount command with 5 options [5] (A) Mount command is used on client machine for mounting the file on Client from server machine. [Any 5 options for 5 marks] Syntax: #mount source mount point E.g. #mount server A:/home / pqr Different options of mount command: 1. ro Requesting for read only operation 2. rw Requesting for read write operation 3. bg Do all the operation in background without disturbing user 4. Soft Use soft mounting 5. Hard Use hard mounting

Q.7 (c) How to configure samba? Also explain how to add samba user. [5] (A) Configure Samba [3 marks] #rpm –i samba #vi /etc/samba/smb.conf #service samba start #smbmount //terry/c /mnt/win Adding samba user [2 marks] Vidyalankar#useradd username #passwd username #smbpasswd –a username #smbpasswd username

18 Prelim Paper Solution

Q.7 (d) What is dns used for? Explain different types of dns servers [5] (A) DNS is used for mapping URL to IP. [2 marks] Types of DNS SERVERS [every server 1 marks each] Primary or master: This is a DNS server maintained by ISP to map URL to IP. Secondary or Secure : This is a backup securer of primary and hence is a replica of primary. It replies only if primary fails. Caching or hint: This is a DNS cache which is maintained on a client machine that contains ip of frequently visited URL.

Q.7 (e) How to disable unknown user upload? What is warez server? [5] (A) There are following two methods that can disable unknown user: Method 1: [2½ marks] 1. Find all the directories and files uploaded by user ftp and remove them #find / user(ftp)|xargs rm – rf 2. Remove user ftp #userdel ftp Method 2: [2½ marks] In a file user_list put username ftp and in vsftpd.conf set USER_DENY=yes also set anonymous_enable=no The server that becomes source to circulate and distribute illegal document like virus is called as WAREZ server

Q.7 (f) What is content negotiation? [5] (A) Content negotiation refers to the technique Web clients and servers use to select how to present a resource, such as a document that is available in several different formats. For example, suppose that a Web page is available in different languages. One way to select the proper language is to give the user an index page from which she chooses the desired language. Content negotiation enables the server to choose the preferred language automatically based on information a Web browser sends, indicting what representations it prefers. [Basic explanation with example 5 marks]

Vidyalankar    

19