C_GRCAC_10 SAP Certified Application Associate – C_GRCAC_10 Exam Dump For Download

https://www.pass4itsure.com/70-410.html

*

Add, remove, and resize logical volumes

*

Diagnose and correct networking service problems where SELinux contexts are interfering with proper operation

7, 9, 10, 11, 12, 13, 14, 15 Configuring a Network Installation Configuring Partitions, RAID, and LVM The CUPS Printing System Automating System Administration: cron and at Network Authentication Configuration: NIS and LDAP Filesystem Management and the Automounter User Account Management, The Basic User Environment, Setting Up and Managing Disk Quotas Creating and Maintaining Special Groups The Red Hat Package Manager, More RPM Commands New Kernels, the Easy Way Adding and Removing RPM Packages with yum and pirut, Managing Updates with Pup and the Red Hat Network (RHN) New Kernels, the Easy Way; Kernel Sources Configuring Partitions, 2 2 7 7 6

329, 443, 493, 557, 585, 613, 649, 691

*

RHCT Installation and Configuration Skills Perform network OS installation Implement a custom partitioning scheme Configure printing Configure the scheduling of tasks using cron and at Attach system to a network directory service, such as NIS or LDAP Configure autofs Add and manage users, groups, and quotas, and File Access Control Lists Configure filesystem permissions for collaboration Install and update packages using rpm Properly update the kernel package Configure the system to update/install packages from remote repositories using yum or pup Modify the system boot loader Implement software RAID at install-

81 96 341 354 313

* * * * *

4 6

200 273, 285, 290 301 222, 227 388 238, 234

* *

6 5

* *

8 5

* *

8 2, 8

388, 392 96, 410

* *

This document is created with trial version of CHM2PDF Pilot 2.15.72. time and runtime RAID, and LVM; Advanced
Partitioning: Software RAID Use /proc/sys and sysctl to modify and set kernel runtime parameters Use scripting to automate system maintenance tasks RHCE Installation and Configuration Skills For HTTP/HTTPS, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For SMB, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For NFS, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For FTP, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For Web proxy, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For SMTP, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For IMAP/IMAPS/POP3, install, configure SELinux support, configure to start on reboot for basic operation and host- and userbased security For SSH, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security For DNS (caching name server, slave name server), install, configure SELinux support, configure to start on reboot for basic operation and host- and userbased security For NTP, install, configure SELinux support, configure to start on reboot for basic operation and host- and user-based security Configure hands-free installation using Kickstart Implement logical volumes at install-time Use iptables to implement packet filtering and/or NAT The Apache Web Server, Virtual Hosts, Apache Access Configuration Samba Services The Basics of the Kernel Automating System Administration: cron and at 9 8 7 444, 466, 456 516 377 329 * * *

10

*

Configuring a Network File System (NFS) Server, Client-side NFS The File Transfer Protocol and vsFTPd

10

494, 509

*

10

512

*

The Squid Web Cache Proxy

9

476

*

Electronic Mail (entire chapter)

12

585

*

Reception with Dovecot

12

589

*

The Secure Shell Package

13

620

*

Domain Name Service (entire chapter)

11

557

*

The Network Time Protocol (NTP)

13

634

*

Using Kickstart to Automate Installation Configuring Partitions, RAID, and LVM Firewalls and Packet Filtering using netfilter, Network Address Translation Pluggable Authentication Modules

5 2 15

244 96 697, 703

* * *

Use PAM to implement user-level restrictions

6

305

*

This document is created with trial version of CHM2PDF Pilot 2.15.72.

This document is created with trial version of CHM2PDF Pilot 2.15.72.

Chapter 1: RHCE Prerequisites
Overview
The Red Hat exams are an advanced challenge. As both the RHCE and RHCT courses specify a number of prerequisite skills, this book assumes that you know some basics about Linux. This chapter covers the prerequisite topics for Red Hat’s RH300 course in a minimum of detail, with references to other books and sources for more information. It also covers the related prerequisites as defined in the Red Hat Exam Prep guide. Unlike those in other chapters and other books in this series, the questions in this chapter include a number of “zingers” that go beyond the chapter’s content. These questions will help determine whether you have the prerequisite skills necessary to handle the remaining chapters. If you’re serious about the RHCE and RHCT exams, this chapter should be just a review. In fact, for any user serious about Linux, this chapter should be trivial. Linux gurus should recognize that I’ve “oversimplified” a number of explanations; my intention is to keep this chapter as short as possible. However, it is okay if you do not feel comfortable with a few topics in this chapter. In fact, it’s quite natural that many experienced Linux administrators don’t use every one of the prerequisite topics in their everyday work. Many candidates are able to fill in the gaps in their knowledge with some self-study and practice. If you’re new to Linux or Unix, this chapter will not be enough for you. It’s not possible to provide sufficient detail, at least in a way that can be understood by newcomers to Linux and other Unix-based operating systems. If, after reading this chapter, you find gaps in your knowledge, refer to one of the following guides:

The Red Hat Enterprise Linux 5 documentation guides, available online from  . Hacking Linux Exposed, Third Edition: Linux Security Secrets and Solutions, by Casarik, Hatch, Lee, and Kurtz, gives you a detailed look at how to secure your Linux system and networks in every possible way. Mastering Fedora Core 5, by Michael Jang, covers the distribution that Red Hat used as one of the testbeds for RHEL 5.

https://www.pass4itsure.com/70-410.html