1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
7

There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi

nistrator account on each department. These local administrators will use a local account in each department for purposes of installing applications, updating/patching software, etc. This local account is not the root account, but a user account that is member of the administrators group.
The Sales and Software Development departments have websites. They must be able to communicate to each other, but not be publicly. There is a main company website however.
The Software development team has to have a development space on the internal network. They use Linux servers as their platform for development so they must have their own space, but they expect the server to be secure.
(a) How would you solve these business requirement , both technically and securely as a new hire of linux system administrator?
Computers and Technology
1 answer:
torisob [31]3 years ago
6 0

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

You might be interested in
Give two reasons you should be aware of your computer's system components and their characteristics.
Degger [83]

Answer:

You should be aware of the components because of the security and the performance of your computer, if your hardware is damaged, your software may be too, and your computer may be in risk, and anyone likes computers with bad performance

brainliest please :)

6 0
3 years ago
WHICH PROGRAMMING LANGUAGES ARE THE BEST AND COMPATIBLE FOR 3D PRINTERS?
Serggg [28]

Answer:

G-code and C++ can be used

5 0
2 years ago
Best app in free to learn python
Allushta [10]

Answer:

Sololearn app

Explanation:

it's very easy to learn python there

4 0
3 years ago
Which are among the ways you can use bitlocker encryption? (choose all that apply?
igor_vitrenko [27]
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
3 0
3 years ago
Nick’s computer has been restarting on its own. what action should he take to solve this issue?
serg [7]
Check for possible software updates, my reasoning for that is the computer could be trying to initiate an update but is stopped by the user if you don't want it to update go to settings and turn off auto update
5 0
3 years ago
Other questions:
  • Which of the following is a list of input devices?
    13·2 answers
  • Insert a function in cell g5 to calculate the first student's monthly payment, using appropriate relative and absolute cell refe
    13·1 answer
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • An IT company revises its process parameters in response to complaints from vendors that products were not ready on time. This w
    15·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • DTE just installed 500kW of solar capacity on the MCCC campus. the cost of the installation was about $3 million. what was the c
    10·1 answer
  • What is the value of the variable result after these lines of code are executed?
    11·1 answer
  • If 2 people use my code D9R2M on fetch reward and scan receipts I will give brainliest ​
    13·2 answers
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!