1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
7

There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi

nistrator account on each department. These local administrators will use a local account in each department for purposes of installing applications, updating/patching software, etc. This local account is not the root account, but a user account that is member of the administrators group.
The Sales and Software Development departments have websites. They must be able to communicate to each other, but not be publicly. There is a main company website however.
The Software development team has to have a development space on the internal network. They use Linux servers as their platform for development so they must have their own space, but they expect the server to be secure.
(a) How would you solve these business requirement , both technically and securely as a new hire of linux system administrator?
Computers and Technology
1 answer:
torisob [31]3 years ago
6 0

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

You might be interested in
According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g
Nat2105 [25]

Answer:

According to the information presented in this​ video, a spreadsheet is effective for managing information about one thing​ (e.g., items for​ sale), but a

C. database

is better for managing information about more than one thing​ (e.g., items for sale and suppliers of​ items).

Explanation:

  • The option A is not correct as the flowchart is a step-by-step explanation of a procedure. It is visual presentation in which we explain a whole process.
  • The  option B is not correct as network is defined as the group of different computers, servers and other machines that helps the exchange of data.
  • The option c is correct as database is the means of storage of data as well as we can access this data at any time and it let you manage the data as well so we can manage a lot of information about multiple things at a time.
  • The option d is also incorrect as workflow is the visual presentation of sequence in which tasks are performed so it doesn't have to do anything wit the managing the information.
  • The option e is also incorrect as data model defines the properties of data of different things and it is used in database. It sets the rule of storing, managing and accessing the data in a database.
7 0
3 years ago
Who invented different photo-capture methods in photography?
geniusboy [140]

Answer:

However, it wasn't until the 19th century that a breakthrough occurred. The world's earliest successful photograph was taken by French inventor Joseph Nicéphore Niépce in 1826. As such, Niépce is considered the world's first photographer and the true inventor of photography as we know it today.

Explanation:

7 0
3 years ago
What is the khan academy game where it is a block having to jump over lava and is an endless runner
saw5 [17]

Answer:https://www.khanacademy.org/computer-programming/lava-the-impossible-game-by-swax97/4638717300965376/embedded?id=1436456095000-0.5&origin=undefined&buttons=yes&embed=yes&editor=no&author=yes

Explanation:

5 0
4 years ago
Based on the following pseudo-codes, if the value of num1 is 6 and the value of num2 is 8, then which of the following is the fi
yuradex [85]
Do any of u have an answer


3 0
4 years ago
Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
trapecia [35]
I believe the answer is d
8 0
3 years ago
Read 2 more answers
Other questions:
  • Given the following code fragment, how many times does the loop body execute? int laps = 50; int myNum = 1; do { myNum = myNum +
    9·1 answer
  • A folder can contain only files? A. True B.False
    10·2 answers
  • Network servers and web servers are examples of what type of server?
    9·2 answers
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • Write a program that will input two numbers and print the larger number on the screen.
    13·1 answer
  • I cant tell if tubbo is a bee or a goat <br>or could he be human in the smp
    12·1 answer
  • How do you think the blitz might have affected civilian morale in london
    15·1 answer
  • 10. Why antivirus is needed to be installed in computer system?
    8·1 answer
  • A vpn is used primarily for which purpose?
    10·1 answer
  • How is a technical certificate like a computer-related associate degree?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!