Preview

IS3440 Wk1 Lab1 Assessment

Satisfactory Essays
Open Document
Open Document
368 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3440 Wk1 Lab1 Assessment
Tyler Rankin
Linux Security
12/14/14

Lab 1 Assessment
1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?
a. The most interesting importance of NTP would be the auto key system, if your system doesn’t keep correct time a attacker who needs to change time so that a replay attack can happen could be very damaging, that is why today’s version of NTP shields against this in several ways.
2. During the install, a password has been set for the “root” user, and when is it appropriate to use this account?
a. It is highly recommended that you only use this account when there are tasks that require root privileges such as moving files or directories into or out of system directories.
3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Windows Environment. Explain the purpose for this recommendation?
a. In a production environment hardware requirements and not to run the X-Windows Environment may sometimes vary, X-Window is intended for primarily workstation use only example personal computing on a Linux box. The X-Window was intended and developed for the network GUI only, X-Windows by itself doesn’t even have an interface.
4. What partitioning options are available when installing CentOS?
5. Why is it important to put the swap file on a separate partition from the root (/)partition?
6. What is the significance of the swap partition in a Linux system?
a. Temporary space $, its swapping information between the memory and the disk. By using SWAP partitions, server performance can be greatly improved, I recommend Swap over other partitions because even though it makes my physical RAM slower it actually works.
7. How is the passwd file used, and what fields make up its content? Explain.
a. The passwd file is used to keep to in track of every user on

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Case 1.1

    • 859 Words
    • 4 Pages

    1. Explain the difference between the three types of server virtualization using the first video.…

    • 859 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Minimum password length, maximum password age, password must meet complexity requirements, and store passwords using reversible encryption…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter?…

    • 957 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    i. The password assigned must be adequately complex to insure that it is not easily guessed and the complexity of the chosen alternative must be defined and documented.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of…

    • 856 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lot2 Task 1

    • 719 Words
    • 3 Pages

    Next, if the software installed did indeed discover the password over the wire and was able to crack it then two changes need to be made. The first is that the password should be sent over the wire in an encrypted format and should be encrypted via current accepted encryption algorithms, such as AES at the date of this document's creation. The second change would be to enforce complex passwords which would be at least one capital letter, one lower case letter, numbers, special characters, and more than 8 characters.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Question 2 What does the –pwd switch do? How can you make DSadd bring up a prompt asking for the users password?…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    It-260 Worksheet

    • 1070 Words
    • 5 Pages

    Press Ctrl+Prt Scr to take a screen shot of the Initial Configuration Tasks window, and then press Ctrl+V to paste the image on the page provided in the lab01_worksheet file.…

    • 1070 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 1

    • 822 Words
    • 4 Pages

    2. During the install, a password has been set for the “root” user. What is the “root “user, and when it is appropriate to user this account.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    7. Which of the following built-in Windows 7 accounts are special identities? Everyone, Authenticated Users.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Windows Installation

    • 930 Words
    • 4 Pages

    In this Analysis assessment I'm going to explain some advantages and disadvantages of windows server 2008 server core and virtual servers. What environments windows server core installation ideal, and I will explain if the security benefits of a core server outweigh the lack of a Graphical User Interface (GUI). I also will go through some advantages and disadvantages of implicating a virtual server in a live network. Finally I will be giving my response to this statement “The drawback of virtual servers is the loss of a physical machine that can lead to the loss of numerous virtual servers and numerous services on the network.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    2. Reconnaissance would be the only legal way to obtain information about a target, footprinting would be rolled into this step.…

    • 292 Words
    • 1 Page
    Satisfactory Essays