Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

questions for cyber secuirty . Please answer throughly and explain in detail. 4.

ID: 3788206 • Letter: Q

Question

questions for cyber secuirty . Please answer throughly and explain in detail.

4. What different ways can the swap space be configured?

Why would you recommend one over the other?

11. During the install, X-Window and a desktop manager were not installed. In a production environment it is recommended NOT to run the X-Window environment. Explain the purpose of this recommendation.

12.How is the passwd file used, and what fields make up its content? Explain.

14.What are the advantages of having users execute privileged commands using sudo over su?

15.How could you automate a CentOS or Red Hat install geared for security?

16. Explain the significance of creating separate partitions of the /var and /boot directories. What is contained within these directories?

Explanation / Answer

Answers:

4)
Temporary space,its swapping information between memory and the disk.By using SWAP partitions,server performanace can be greatly improved,I recommend Swap over other partitions because even though it makes my physical RAM slower it actually works.There are several ways to configure the swap partition for example
if I have a 0KB as a swap partition and I wat to configure swap space to 2 GB ,first I would create a SWAP partitions of 2 GB with Fdisk then I would create the file system such as mkswap/dev/hdax and finally add a new entry to the /etc/fstab file.

12)

The passwd file is used to keep to in track of every user on the system.This file consist of your user name,real name ,identification information and much more.The that make up its content are Rachel,eH5/.mj7NB3dx,181,100,etc.

14)

IMO the major advantages of sudo over su are that sudo has superior logging of what commands were run and sudo gives finer control over what users can do.su is all or none, but sudo can be configured to allow access to some, but not all commands.Since you must usually invoke sudo each time you want to do something that requires privileges, the reasoning is that you will "think before you leap", i.e. not just stick sudo in front of something without thinking for a second what the command you're running is going to do.With su on the other hand, once you're in, you're in. You have carte blanche (an open license) to do anything and everything, and the reasoning is you might forget for a moment that you have those privileges and if you're unlucky, execute something that will seriously affect/damage your system -- if you did not have su privileges, the command wouldn't have done anything serious.

16)

Significance:An

Contents of the given directories:

/var :   This is where spool directories such as those for mail and printing go. In addition, it contains the error log directory.
/boot:This is where your kernel images and boot loader configuration go.

15)

You can allow an installation to run unattended by using Kickstart. A Kickstart file specifies settings for an installation. Once the installation system boots, it can read a Kickstart file and carry out the installation process without any further input from a user.
Note:The Red Hat Enterprise Linux installation process automatically writes a Kickstart file that contains the settings for the installed system. This file is always saved as /root/anaconda-ks.cfg. You may use this file to repeat the installation with identical settings, or modify copies to specify settings for other systems


Red Hat Enterprise Linux includes a graphical application to create and modify Kickstart files by selecting the options that you require. Use the package system-config-kickstart to install this utility. To load the Red Hat Enterprise Linux Kickstart editor, choose Applications System Tools Kickstart.
Kickstart files list installation settings in plain text, with one option per line. This format lets you modify your Kickstart files with any text editor, and write scripts or applications that generate custom Kickstart files for your systems.To automate the installation process with a Kickstart file, use the ks option to specify the name and location of the file.To obtain a Kickstart file from a script or application on a Web server, specify the URL of the application with the ks= option. If you add the option kssendmac, the request also sends HTTP headers to the Web application. Your application can use these headers to identify the computer. This line sends a request with headers to the application http://server.mydomain.com/kickstart.cgi: .