Module 3: Server and User Administration

Spread the love

INTRODUCTION – Server and User Administration

Through this module, you will be in a position to understand user management for Windows and Linux environments with a fair idea of the security vulnerabilities that these operating systems are exposed to and the important components necessary to build your skill in the field of cybersecurity.

Learning Outcomes:

  • Running common commands in Linux from the terminal
  • Install and configure Samba for communication between Linux and Windows systems over the network.
  • Recall the functionality of fundamental shell commands in Linux.
  • Explain popular shell options in Linux.
  • Describe what is performed at each Linux run level.
  • Describe the file system and directory structure in Linux.
  • Describe the kernel and shell in Linux.
  • Describe in general the reason for which organizations prefer Linux.
  • Understand the nine types of Windows security events that can be audited by administrators.
  • Know the importance of having a security auditing policy in an organization.
  • Find and view Windows Server logs.
  • Discuss server logs as they relate to network administration.
  • Kerberos authentication and its advantages regarding Windows security and compliance.
  • Utility of the Windows Admin Center for managing servers.
  • Explain the scope related to Active Directory groups.
  • Understand the two types of Active Directory groups.
  • Formulate guidelines on restricting and protecting sensitive domain accounts with Active Directory.
  • Differentiate the four types of Active Directory accounts.
  • Classify key features of Active Directory.
  • Show how Active Directory works.
  • Describe features of Windows Security App.
  • Discuss security matters concerning local Windows systems management.
  • Describe default local accounts in Windows.
  • Local user accounts as defined within Windows.
  • Explain the principles of least privilege and the benefits of least privilege to users.

WINDOWS ADMINISTRATION

1. Which three (3) objects are typically managed by active directory?

  • Network User (CORRECT)
  • Local Accounts
  • Services (CORRECT)
  • Volumes (CORRECT)

Correct, It represents one of the objects, which Active Directory is managing.

2. Which type of group within Active Directory is used to assign permissions to shared resources?

  • Service groups
  • Data groups
  • Distribution groups
  • Security groups (CORRECT)

Correct, Such types of groups are generally used for the purpose of assigning permissions to shared resources.

3. Kerberos Authentication provides several benefits including which three (3) of the following?

  • single sign on (CORRECT)
  • delegated authentication (CORRECT)
  • distributed authentication
  • interoperability (CORRECT)

Partially correct, The advantage of Kerberos Authentication is that it makes it possible to securely authenticate users and services, reducing the requirement for typing in passwords a safe number of times, while still using the shared assets.

4. Which of the nine different kinds of Windows events that can be audited is used to see when someone has shutdown or restarted the computer or when a program tries to do something it does not have permission to do?

  • Policy change
  • Privilege Use
  • System events (CORRECT)
  • Process tracking

Correct, The event is used for auditing the action of shutting down or restarting a system.

LINUX BASICS

1. True or False:  Internal commands are built into the shell program and are shell dependent?

  • False
  • True (CORRECT)

Correct, The event is used for auditing the action of shutting down or restarting a system.

2. Which Linux Run Level shuts down all services when the system is being rebooted?

  • Run Level 0: Halt
  • Run Level 1:  Single User
  • Run Level 5:  Graphical
  • Run Level 6:  Reboot (CORRECT)

Correct, reboot does shut down all services.

SERVER AND USER ADMINISTRATION

1. Which Windows directory folder stores per-user application data and settings?

  • \Users
  • \Program Files
  • \System
  • \AppData (CORRECT)

2. Which is NOT an example of a default Windows local user account?

  • Guest
  • HelpAssistant
  • Administrator
  • Network Service (CORRECT)

3. Which feature allows Active Directory to be shared by multiple servers?

  • A Set of rules
  • A query and index mechanism
  • A replication services (CORRECT)
  • A global catalog

4. What tool can an administrator use to manage servers on private networks that are not connected to the Internet?

  • AWS Active Directory
  • Windows Admin Center (CORRECT)
  • Network Admin Center
  • Privileged Admin Center

5. Which of the nine different kind of Windows events that can be audited is used to see each instance of a user logging on to and logging off from another computer?

  • Directory service access
  • Object access
  • Account management
  • Account logon (CORRECT)

6. Which of these commands does not shutdown the Linux operating system?

  • reboot
  • grep (CORRECT)
  • shutdown -r
  • init 6

7. Which Linux commands are totally shell-independent and usually found in any Linux distribution?

  • Internal commands
  • External commands (CORRECT)

CONCLUSION – Server and User Administration

It has been admitted that mastery of managing users in both Windows and Linux platforms, along with a good understanding of security vulnerabilities and their key components associated with them, is the key to making progress as an individual in the cybersecurity industry.

You’ll equip yourself to better tackle the issues of operating and securing operating environments, thereby ensuring their safe and reliable protection from threat actors when you thoroughly cover the different aspects mentioned.

Leave a Comment