1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
7

There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi

nistrator account on each department. These local administrators will use a local account in each department for purposes of installing applications, updating/patching software, etc. This local account is not the root account, but a user account that is member of the administrators group.
The Sales and Software Development departments have websites. They must be able to communicate to each other, but not be publicly. There is a main company website however.
The Software development team has to have a development space on the internal network. They use Linux servers as their platform for development so they must have their own space, but they expect the server to be secure.
(a) How would you solve these business requirement , both technically and securely as a new hire of linux system administrator?
Computers and Technology
1 answer:
torisob [31]3 years ago
6 0

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

You might be interested in
Why is it important to save a print copy of electronic sources
AURORKA [14]
I don't exactly know WHY, but I can guess..
I think it's because, if you're writing, you can know where the source is from if you print the WHOLE SCREEN, or just to remember what the electronic source says.
4 0
3 years ago
How can I use the internet/social media to protect my identity?
sattari [20]
Don't show your face and don't put your name or location online? i'm confused by this question.
3 0
3 years ago
The Quick Access Toolbar cannot be customized and have extra commands added to it
sattari [20]

false

plz mark brainliest


4 0
3 years ago
The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
Ede4ka [16]

The terminology used to describe a possible path to a resolution to a problem from one end to the other is called a solution.

<h3 /><h3>What is terminology?</h3>

The research of these phrases and related applications is known as terminology science. A glossary is a collection of specialist words plus their corresponding interpretations in a given field.

If there is a body or a term which is the need to have a resolution that needs to be made through that the person can evaluate and find a solution for the following situation then that is called a resolution or solution for that particular problem

Learn more about terminology, here:

brainly.com/question/2511894

#SPJ1

6 0
1 year ago
one data is in memory the computer interpets and executeinstructions to process the data into informationA. TrueB. False
lidiya [134]

Answer:

Option A is the correct answer for the above question.

Explanation:

  • The computer is a system that processes the data to produce information. For any computer system when the data is processed then it will form the information.
  • The user gives some instruction to process that can also be called the program. Then the computer takes the instruction and processes the data on behalf of the instruction and for the information because in any system when data is processed it can form the information.
  • The above question says that the computer follows the instruction to process the data to produce the information which is correct as described above. Hence True is the correct answer to the above question.
4 0
4 years ago
Other questions:
  • What does CPL stand for
    9·2 answers
  • What ipconfig command line option can be used to delete cached dns information from memory?​?
    9·1 answer
  • A ________ is a member function that is automatically called when a class object is
    6·1 answer
  • Circular errors are caused by adding the cell name of a/an _______ cell to a formula.
    6·2 answers
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • Write a couple of paragraphs about the usefulness of computer​
    5·1 answer
  • Do you think it’s better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
    14·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
  • Using C++
    13·1 answer
  • Darla is going to start writing the HTML code for a web page. What would she start with?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!