Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Linux Administration - Second Edition

You're reading from  Mastering Linux Administration - Second Edition

Product type Book
Published in Mar 2024
Publisher Packt
ISBN-13 9781837630691
Pages 764 pages
Edition 2nd Edition
Languages
Authors (2):
Alexandru Calcatinge Alexandru Calcatinge
Profile icon Alexandru Calcatinge
Julian Balog Julian Balog
Profile icon Julian Balog
View More author details

Table of Contents (24) Chapters

Preface 1. Part 1:Basic Linux Administration
2. Chapter 1: Installing Linux 3. Chapter 2: The Linux Shell and Filesystem 4. Chapter 3: Linux Software Management 5. Chapter 4: Managing Users and Groups 6. Chapter 5: Working with Processes, Daemons, and Signals 7. Part 2:Advanced Linux Administration
8. Chapter 6: Working with Disks and Filesystems 9. Chapter 7: Networking with Linux 10. Chapter 8: Linux Shell Scripting 11. Chapter 9: Securing Linux 12. Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting 13. Part 3:Server Administration
14. Chapter 11: Working with Virtual Machines 15. Chapter 12: Managing Containers with Docker 16. Chapter 13: Configuring Linux Servers 17. Part 4:Cloud Administration
18. Chapter 14: Short Introduction to Cloud Computing 19. Chapter 15: Deploying to the Cloud with AWS and Azure 20. Chapter 16: Deploying Applications with Kubernetes 21. Chapter 17: Infrastructure and Automation with Ansible 22. Index 23. Other Books You May Enjoy

Exercises

Here’s a brief quiz about some of the essential concepts that were covered in this chapter:

  1. Enumerate at least a couple of ACMs that are used in Linux.

    Hint: DAC, ACL, MAC, RBAC, MLS, MCS

  2. Enumerate the fields of the SELinux security context.

    Hint: user, role, type, level

  3. What is a domain in SELinux?

    Hint: Type assigned to a process

  4. Can you think of a significant difference between SELinux and AppArmor in terms of enforcing security policies?

    Hint: SELinux uses policies based on file labels, while AppArmor uses security policies based on paths.

  5. How do we toggle an AppArmor application profile between the enforce and complain modes?

    Hint: Using aa-enforce and aa-complain

  6. How many chains can you think of in the Linux kernel networking stack?

    Hint: Figure 9.41 could help you.

  7. What is the default firewall management solution in RHEL/Fedora? How about Ubuntu?

    Hint: firewalld (Fedora) and ufw (Ubuntu)

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}