Faculty Computing Assessment Name Ex: Mid/End/Sup Internal Assessment 6 Paper Code CIPC/G18I1-1 Module Name Linux Network Administration Module Code C8-LNA-11 Month December Year 2020 Total Marks 36 Duration 2 hrs Instructions 1. Your Student ID must be CLEARLY written on the answer sheet. 2. Taking help from others or assisting others during the examination is strictly prohibited. If you are caught doing so, strict measure will be taken against you. 3. You should strictly adhere to the allocated timings and no additional time will be given to anyone for any reason. 4. Question paper comprises two parts, A & B with a total of ten questions. QP-ASM-00|Rev 003 5. At the end of the exam, submit your answer sheet to your invigilator. Page 1 of 2 INTERNAL ASSESSMENT 6 QUESTION PAPER C8-LNA-11 (Linux Network Administration) Marks: 36 Duration: 2 hrs Answer ALL questions. PART - A 1. Which file system type is created if the system administrator uses the mkfs command without any file system specification? [1] 2. What is the primary advantage of having a journal in a file system? [1] 3. Create a file system ext3 on partition /dev/sdb1 & mount it using the mount point of your choice, then view the mounted file systems. Give a file system a label (mylabel) to uniquely identify it. Extend the created file system with 2000MB. Finally, unmount the file system & remove it from the system. [10] 4. Explain the importance of Access Control Lists (ACL) & Disk Quotas in file system management. [2] 5. What command would add ACLs to the mount of the /dev/sda2 partition on the /home directory? Assume the filesystem is already mounted. [2] 6. What command reads current ACLs for the local file named question5? Assume that file is on a filesystem mounted with ACLs. [2] 7. What single command gives members of the group named managers read only access to QP-ASM-00|Rev 003 the project6 file in the /home/project directory? Assume the managers group already has read and execute access to the directory. [2] 8. What command prevents members of the group named temps from having any access to the secret7 file in the /home/project directory? [2] PART – B 1. Differentiate between graphical and text-based modes of RHEL installation. [4] 2. In your own words briefly define the RHEL installation process using text-based approach. [10] Page 2 of 2