Novell Certified Linux Engineer (Novell CLE) Study Guide (Novell Press)

 <  Day Day Up  >    

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

RAM

       NNLS

                installation requirements

rcd daemon

        configuring (NNLS Red Carpet) 2nd 3rd 4th 5th 6th

       NNLS

                Red Carpet component 2nd

                updating (lab exercise 5-4) 2nd 3rd 4th 5th

        product updates (NNLS Red Carpet) 2nd 3rd 4th 5th 6th 7th

       RCD Groups

                creating (NNLS)

                modifying (NNLS) 2nd

                populating (NNLS)

Read permission 2nd 3rd 4th 5th 6th 7th 8th

read property rights

        eDirectory objects

Read-Only replica

        eDirectory databases

Read/Write replica

        eDirectory databases

reboot command

Red Carpet

        NNLS version management services functions

Red Carpet Client

       NNLS component

                required data 2nd

Red Carpet component

        configuring rcd daemon 2nd 3rd 4th 5th 6th

       NNLS

                channels 2nd

                rcd daemon 2nd

                update files 2nd

                update function 2nd

       product updates

                managing 2nd 3rd 4th 5th 6th 7th

       RCD Groups

                creating

                modifying 2nd

                populating

Red Carpet daemon

       active Internet connections

                configuring for NNLS installations

Red Hat Linux

Red Hat Package Manager (RPM)

        package installations 2nd 3rd

RedHat Enterprise Linux AS 2.1

        NNLS platform support 2nd

RedHat Enterprise Linux ES 2.1

        NNLS platform support 2nd

redirection

       Linux User Management (LUM)

                authentication requests 2nd 3rd 4th 5th

relative names

        eDirectory naming conventions 2nd

remote access

        Virtual Office

remote files

        accessing (NFS)

Rename Object event

        rules (DirXML)

rename rights

        eDirectory

replica rings

replicas

        eDirectory databases

                Master

                Read-Only

                Read/Write

                Subordinate Reference

reports

       iFolder

                system monitoring 2nd 3rd 4th

ResierFS partitions 2nd

Resource Usage

        NetStorage configuration

reverse-compiling software

rights

        eDirectory

                browse

                create

                delete

                inheritance of 2nd

                inheritance of, blocking

                property 2nd

                rename

                supervisor

        Inherited Rights Filters (IRFs) 2nd

rm command

rmdir command

root directory

        referencing

root user accounts

        security warnings

route command

routers

       network interfaces

                configuring (YaST)

rpm command

        package installations 2nd 3rd

rule object (dirXML) 2nd

rules

        DirXML 2nd

                event monitoring 2nd 3rd 4th 5th 6th 7th

runlevels

        services 2nd 3rd 4th

 <  Day Day Up  >    

Категории