Top-Rated Free Essay

Week2 lab 1

Good Essays
Lab Assessment Questions & Answers
1. What is the significance of creating Groups and adding Users to Groups? Explain.
It is important to put user in groups because it is easier manager there permissions. Instead of assigning permissions to a new user every time someone is hired, you would just add them to the groups they need.
2. Given a scenario where there are five (5) database administrators that may periodically need access to a given system. Discuss a concept to better manage these administrators' access permissions.
You would add the 5 dba’s to group that would be assigned access to the system.
3. The new web administrator's account has been set up and a password provided. What is the process to force a password change upon first login? You should type “su –c ‘ change –d 0 (users name)”
4. What is the purpose of the “su” command? Explain its significance. The su command allows you to run commands a super user or better known as root. The is kind of like when windows ask you if you want to run this program as an administrator. Instead of it asking you are telling it you want to run the command as root.
5. Restricting the use of the 'su' command can be configured using what mechanism? You would edit /etc/pam.d/su. And remove the # simbule meaning that now this group selected needs authentication to run the su command.
6. What is the purpose of the login.defs file? Explain the contents and configuration options? Login .defs file , Allows you to change the password/ account requirements for each user. It contains how long a password could be used, the minimum days allowed between password changes, how long the password can be, and the number of days you will be warned before the password expires.

7. What is the PASS_MIN_DAYS setting? Why would it be a good idea to set the PASS_MIN_DAYS setting?
The PASS_MIN_DAYS is the minimum number of days allowed before changing the password. They would be a good idea to change because you wouldn’t was a user to always changing the password then forgetting it because they are always changing it.
8. What is the PASS_MAX_DAYS setting? Why would it be a good idea to set the PASS_MAX_DAYS setting?
The PASS_MAX_DAYS is the maximum number of days a password maybe used. They would be a good idea to change because you wouldn’t was a user to always use the same password. So by setting the you are forcing a user to reset there password.
9. Will changes to the commands /etc/login.defs settings (PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE) take effect to existing accounts? Yes
10. Describe the password and account settings you would configure if you were told that there were a few contractors that needed accounts on the Linux system for the next 14 days. The command you would run for a temp user would be su –c ‘change –e 2014-9-29 (username)

You May Also Find These Documents Helpful

  • Good Essays

    Lab-Week2

    • 775 Words
    • 3 Pages

    DOWNLOAD THE LAB INSTRUCTIONS AND START THE LAB. In computers binary code is the language that communicated between applications. Binary Code is a coding system using only digits 0 and 1 to represent a letter, digit or other characters in a computer. It is hard to imagine that huge and hard calculations are done on computers applications, which only use a 0 or 1 to come up with the solution. Binary is a base 2 numbering system. Which means each digit can be one of two values, a 1 or a 0. Our traditional…

    • 775 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    week2 lab#4

    • 258 Words
    • 2 Pages

    Week 2 Lab #4 Assessment ISSC362: IT Security: Attack & Defense 20 december 2013 Lab #4 – Assessment Worksheet 1. Phase 1—Reconnaissance, Phase 2—Scanning, Phase 3—Gaining Access, Phase 4—Maintaining Access, Phase 5—Covering Tracks 2. Zenmap does an intense scan of all TCP ports in order to find open and vulnerable ports. 3. Phase 1 Reconnaissance 4. This is referred to by many names, but typically just called a vulnerability scan. Can be done with tools such as Nessus or Microsoft baseline…

    • 258 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Flies Reveal about Inheritance? Lab Notebook Chi-Square test for Case 1 Phenotype Observed No. (o) Expected No. (e) (o-e) (o-e) 2 (o-e) 2 e Red eyes 31 33 2 4 0.1212 Sepia eyes 13 11 2 4 0.3636 2 (to the nearest ten-thousandth) 0.4848 Questions 1. Why is it important to remove the adults in the parental generation? To keep the tests accurate, it is important to separate the adults from the parental generation so you know you are only crossing the F-1 flies. 2. What generation…

    • 356 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    week2

    • 840 Words
    • 3 Pages

    Regulations.gov is a good place to begin your research. Pick one proposed regulation change currently under consideration (if you find one that has already closed out but interests you, you can use that instead) and write the following regarding it: 1. State the administrative agency that controls the regulation. Explain why this agency and your proposed regulation interests you (briefly). Will this proposed regulation affect you, or the business in which you are working? If so, how? Submit a copy…

    • 840 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    PHI445 Week2 Discussion 1

    • 488 Words
    • 2 Pages

    In advertising today, there are many misconceptions and falsity in advertisements. We are exposed to countless commercial messages every day persuading us to buy brand name products, creating images for us to adopt, and convincing us that we need and want more. Because of this, it's important for us to carefully examine ads to determine exactly what they are saying. Advertisements can be very misleading and it is not fair to the consumer. Advertisers will make claims about their product or service…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Process of Science What Can Fruit Flies Reveal about Inheritance? Lab Notebook Chi-Square test for Case 1 Phenotype Observed No. (o) Expected No. (e) (o-e) (o-e) 2 (o-e) 2 e Red eyes 3 Sepia eyes 1 2 (to the nearest ten-thousandth) Questions 1. Why is it important to remove the adults in the parental generation? It is important to keep the generations separate so that you know you are crossing only F1 flies. 2. What generation will their offspring be? The new offspring…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1 1

    • 814 Words
    • 9 Pages

    Bryan Westall NT1210 Lab 1.1 Lab 1.1: Reading Binary Exercise 1.1.1 Create a mapping similar to Figure 1-1 for the decimal number 2931 using either paper and pencil or a Word document. Exercise 1.1.2 Create a mapping similar to Figure 1-2 for the binary number 1102 using either paper and pencil or a Word document. 1102=7 (128) 27 (64) 26 (32) 25 (16) 24 (8) 23 (4) 22 (2) 21 (1) 20 1 1 0 Exercise 1.1.3 Create a mapping similar to Figure 1-2 for the binary number…

    • 814 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    Lab #1 – Assessment Worksheet Performing Reconnaissance and Probing Using Common Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you explored the common tools available in the virtual lab environment…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    ITT Technical Institute - Print 1 of 30 http://itt.coursesmart.com/print?__displaygrbooks=1&xmlid=97812692... User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 2. No part of any book may be reproduced or transmitted by any means without the publisher's prior permission. Use (other than qualified fair use) in violation of the law or Terms of Service is prohibited. Violators will be prosecuted to the full extent of the law. 9/20/2014 11:21 AM ITT Technical…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    Lab Report 1. What are the business goals? (10 points) Business Goals for this project include addressing the growth of on-campus and online students. To accomplish these goals a centralized server located in new IT wing of the administration building providing online backup of all data. Replacing the PBX-based telephone system with a VoIP based system and connecting all buildings providing high-speed wired network connection for all facility offices will be implemented along with controlled…

    • 716 Words
    • 3 Pages
    Good Essays