1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Montano1993 [528]
3 years ago
7

There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi

nistrator account on each department. These local administrators will use a local account in each department for purposes of installing applications, updating/patching software, etc. This local account is not the root account, but a user account that is member of the administrators group.
The Sales and Software Development departments have websites. They must be able to communicate to each other, but not be publicly. There is a main company website however.
The Software development team has to have a development space on the internal network. They use Linux servers as their platform for development so they must have their own space, but they expect the server to be secure.
(a) How would you solve these business requirement , both technically and securely as a new hire of linux system administrator?
Computers and Technology
1 answer:
torisob [31]3 years ago
6 0

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

You might be interested in
Which of the following is least likely to be a scientific experiment?
enot [183]
It would be the last one, because she isn't recording any type of data over what she is doing and she isn't observing it at all. She simply trimmed the stems of a bouquet of flowers. However, the other options insist that they are recording data and observing, like you would do when performing an experiment. I hope this helps! :)
8 0
3 years ago
Read 2 more answers
What does % find on edhesive??
statuscvo [17]

Answer:

Explanation: What is that word you typed?

3 0
3 years ago
Which of the following is an example of a database?
Katyanochek1 [597]
I think it’s A or D hope that helps
6 0
3 years ago
Read 2 more answers
What is the arc of technology it can't be a brand or app
Maru [420]

aim or audacity or avatar

bluetooth or blogspot

camera or cpu or core

5 0
3 years ago
what do we know about the contents of the arrays left and right with respect to what objects (integers) they contain in general
KIM [24]

A "divide and conquer" approach known as binary search necessitates sorting the starting array first. Because the technique divides the array into two equal halves, it is called a binary algorithm. A binary search will initially examine the middle item in the array and evaluate it in relation to the search terms.

<h3>What exactly is binary search?</h3>
  • Finding an element's location in a sorted array can be done using the searching method known as binary search.
  • With this method, an array's middle is always searched for the element. Only on a list of things that has been sorted can binary search be used. If the elements are not sorted already, we need to sort them first.
  • Binary search is used to find values in any sorted collection from any language library, including Java,.NET, C++ STL, etc.
  • A sorted array can be searched using the binary search algorithm by continually halving the search interval. Utilizing the knowledge that the array is sorted, binary search attempts to minimize the time complexity to O (Log n).

To Learn more about binary search refer:

brainly.com/question/21475482

#SPJ4

3 0
1 year ago
Other questions:
  • Software that interprets commands from the keyboard and mouse is also known as the A.hard drive.B.operating system.C.desktop or
    7·2 answers
  • How do rubrics increase learning?
    15·2 answers
  • What are tags?
    13·1 answer
  • Define binary number and decimal number with example​
    14·1 answer
  • Bloodborne pathogens travel by way of blood cells and can only be spread by person-to-person contact with infected blood
    5·2 answers
  • Sensitive security information can be shared with whom
    13·2 answers
  • This is not based on homework but I have a question. I am currently using a gtx 960 with a 6 core amd processor. Does anyone kno
    6·1 answer
  • You install a new driver, but your device still doesn't work. What is the first thing you should do?
    14·1 answer
  • Given the following table of students, assignments, and grades for a single class:
    6·1 answer
  • Which of the following safety and privacy features is not included in a P2P app or service?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!