LinuC Level 2
LinuC-2
Exam 202 Objectives (Version 10.0)
LinuC Level 2 certification is awarded after passing both Exam 201 and Exam 202 and having an active LinuC Level 1 certification. The exams may be taken in any order. The objectives of level 2 cover the advanced technology necessary for Linux engineers common to Linux distributions.
Each item of the objectives is weighted for its importance. The weight is approximately in the range 1 to 10, and indicates the relative importance of the topic covered. Questions on topics with higher weight appear more often in the exams.
Topic 2.07: Network client management
Weight | 2 |
---|---|
Overview | Candidates can set up a DHCP server. This includes setting default and per-client options, as well as adding static and BOOTP hosts. It also includes setting up a DHCP relay agent and maintaining a DHCP server. |
Details |
|
Weight | 3 |
---|---|
Overview | Candidates can configure PAM to support authentication in various ways. This includes basic SSSD (System Security Services Daemon) functions. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates can query and update LDAP server. It also includes adding and importing items and adding and managing users. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates set up a basic OpenLDAP server, including knowledge of the LDIF format and important access controls. |
Details |
|
Topic 2.08: Domain Name Server
Weight | 3 |
---|---|
Overview | Candidates can configure BIND to act as an authoritative server, a recursive server, or a cache-only DNS server. This includes managing running servers and setting up logging. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates can create forward and reverse lookup zone files and root hint files. This includes setting appropriate values in the record, adding the host to the zone, and adding the zone to DNS. It also includes performing zone delegation to other DNS servers. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates can configure the DNS server to run in a chroot environment as a non-root user. This includes the secure exchange of data between DNS servers. |
Details |
|
Topic 2.09: HTTP Server and Proxy Server
Weight | 3 |
---|---|
Overview | Candidates can install and configure Apache HTTP Server. This includes monitoring server load and performance, limiting user access from clients, settings that support scripting languages as modules, and client user authentication settings. It also includes limiting resource usage through server option settings. Candidates can configure Apache HTTP Server to use a virtual host and customize access to files. |
Details |
|
Weight | 3 |
---|---|
Overview | Candidates can configure the Apache HTTP Server to provide HTTPS. |
Details |
|
Weight | 3 |
---|---|
Overview | Candidates can install and configure the reverse proxy server, nginx. This includes configuring nginx as an HTTP server. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates can install and configure a proxy server. This includes access policies, authentication and resource usage. |
Details |
|
Topic 2.10: E-Mail Services
Weight | 3 |
---|---|
Overview | Candidates can manage email servers. This includes email aliases, access restrictions, and virtual domain settings. It also includes setting up internal email relays and monitoring email servers. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates can install and configure POP and IMAP daemons. |
Details |
|
Topic 2.11: File Sharing Services
Weight | 4 |
---|---|
Overview | Candidates can set up a Samba server for various clients. This includes setting up Samba for clients to log in to, workgroups for servers to join, defining shared directories, and troubleshooting installation. |
Details |
|
Weight | 3 |
---|---|
Overview | Candidates can use NFS to export the file system. This includes access restrictions, mounting NFS file systems on clients, and NFS protection. |
Details |
|
Topic 2.12: System Security
Weight | 3 |
---|---|
Overview | Candidates can protect the network by configuring your system to forward IP packets or perform network address translation (NAT or IP masquerading). This includes setting port redirection, managing filter rules, and evading attacks. |
Details |
|
Weight | 4 |
---|---|
Overview | Candidates can configure and protect the SSH daemon. This includes key management and configuring SSH for users. |
Details |
|
Weight | 2 |
---|---|
Overview | Candidates can set up VPN (Virtual Private Network) and secure point-to-point or site-to-site connections. |
Details |
|
Weight | 3 |
---|---|
Overview | Candidates can collect security alerts from various sources. Candidates can install, configure, and run an intrusion detection system. Candidates can apply security patches and bug fixes. |
Details |
|
Topic 2.13: System Architecture
Weight | 2 |
---|---|
Overview | Candidates understand the system configuration that achieves the required level of availability. |
Details |
|
Weight | 2 |
---|---|
Overview |
|
Details |
|
Weight | 2 |
---|---|
Overview |
|
Details |
|
Weight | 3 |
---|---|
Overview | Candidates understand the system configuration patterns for ensuring high availability and scalability. |
Details |
|