Top-Rated Free Essay
Preview

Week2 lab 1

Good Essays
494 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week2 lab 1
Lab Assessment Questions & Answers
1. What is the significance of creating Groups and adding Users to Groups? Explain.
It is important to put user in groups because it is easier manager there permissions. Instead of assigning permissions to a new user every time someone is hired, you would just add them to the groups they need.
2. Given a scenario where there are five (5) database administrators that may periodically need access to a given system. Discuss a concept to better manage these administrators' access permissions.
You would add the 5 dba’s to group that would be assigned access to the system.
3. The new web administrator's account has been set up and a password provided. What is the process to force a password change upon first login? You should type “su –c ‘ change –d 0 (users name)”
4. What is the purpose of the “su” command? Explain its significance. The su command allows you to run commands a super user or better known as root. The is kind of like when windows ask you if you want to run this program as an administrator. Instead of it asking you are telling it you want to run the command as root.
5. Restricting the use of the 'su' command can be configured using what mechanism? You would edit /etc/pam.d/su. And remove the # simbule meaning that now this group selected needs authentication to run the su command.
6. What is the purpose of the login.defs file? Explain the contents and configuration options? Login .defs file , Allows you to change the password/ account requirements for each user. It contains how long a password could be used, the minimum days allowed between password changes, how long the password can be, and the number of days you will be warned before the password expires.

7. What is the PASS_MIN_DAYS setting? Why would it be a good idea to set the PASS_MIN_DAYS setting?
The PASS_MIN_DAYS is the minimum number of days allowed before changing the password. They would be a good idea to change because you wouldn’t was a user to always changing the password then forgetting it because they are always changing it.
8. What is the PASS_MAX_DAYS setting? Why would it be a good idea to set the PASS_MAX_DAYS setting?
The PASS_MAX_DAYS is the maximum number of days a password maybe used. They would be a good idea to change because you wouldn’t was a user to always use the same password. So by setting the you are forcing a user to reset there password.
9. Will changes to the commands /etc/login.defs settings (PASS_MAX_DAYS, PASS_MIN_DAYS and PASS_WARN_AGE) take effect to existing accounts? Yes
10. Describe the password and account settings you would configure if you were told that there were a few contractors that needed accounts on the Linux system for the next 14 days. The command you would run for a temp user would be su –c ‘change –e 2014-9-29 (username)

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 Week 1 Labs 1

    • 3680 Words
    • 20 Pages

    Create a mapping similar to Figure 1- 2 for the binary number 11 2 using either paper and pencil or a Word document.…

    • 3680 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users. This…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    1.) Change control manager enforces change of things passwords. Password change policies makes things difficult for hackers. It’s Brute force attack.…

    • 84 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3. Administrators need to take into account the roles and permissions of the existing infrastructure. Planning and mapping out of the groups, policies, rules, and permissions will need to be thought out. This will lessen the mistakes of having some overlap or leaving gaps of security loop holes. Wiping out existing structure after migrating users.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    iv. Users or workforce members must not allow another user or workforce member to use their unique user identification or password.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    pt2520 unit 8

    • 287 Words
    • 1 Page

    Whereas SQL Server supports two authentication systems, Microsoft Access supports three. Unfortunately, three is not necessarily better than two, and the Access security system is not suited for large enterprise usage. The most commonly used is Database Password. A database password is simply a password that Access prompts you to type in when opening the database. A database can have only one password. You cannot assign a different password to different users.…

    • 287 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    They are the responsible to manage the DBMS’s use and also creating, modifying and maintaining the database. Which to ensure the database is functioning properly.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to go in to Web Admin and change how the website looks and Web Admin can’t go in to Linux and change how things run.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Use least-privileged accounts, consider the granularity of access, enforcing separation of privileges, secure the system resources against system identities DB system having multiple administrators…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Assignment

    • 533 Words
    • 3 Pages

    Art.1. The Database Management allows you to update the database password and quota, monitor the storage usage of your database, backup and restore your databases, and provides an example of a connection string name.…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Pm3110 Unit 1 Paper

    • 529 Words
    • 3 Pages

    • Data Administrator – control the access permissions and privileges, install the new DBMS, data available in consistent form, provide scope for data recovery and data security…

    • 529 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Data base administrator

    • 529 Words
    • 3 Pages

    This position is responsible for the performance, integrity and security of a database. Additional role requirements are likely to include planning, development and troubleshooting. DBA roles are generally identified by the databases, the processes they administer and the capabilities of the database management system (DBMS) in use.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    True False

    • 378 Words
    • 2 Pages

    12. User access refers to what objects and data in a database a user has permission to use.…

    • 378 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    2.2 Password protection could be used to ensure security when storing and/or accessing information. Also ensuring that no-one who is…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Executive Summary

    • 602 Words
    • 3 Pages

    Businesses are placing higher demands on database administrators. With the popularity of application integration, the internet, and the need for improved business security. The regulatory commissions have increased the need for skilled personnel in developing, creating, managing, testing, securing, and backing up databases.…

    • 602 Words
    • 3 Pages
    Good Essays