Question

Linux

3. Describe the uses of policy documents and the procedure documents in system administration and provide a scenario for the use of each.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Administrator Access is defined as a level of access above that of a normal user. This definition is intentionally vague to allow the flexibility to accommodate varying systems and authentication mechanisms.After installation, Linux requires configuration and systems administration. Corporate systems need monitoring, backups, updates, as well as system and user management.

Processes execute within their own process environment, they have their own memory, current working directory, priority, process ID, parent process ID and the file access privileges of the user ID under which they execute.

The basic Linux monitoring commands such as pstree and ps -auxw and top will inform you of the processes running on your system. Sometimes a process must be terminated.

The three most common methods of defining a Linux user and authenticating their logins are:

  1. Local user authenticated locally with the password files /etc/passwd and /etc/shadow
  2. Network authentication using an LDAP authentication server
  3. NIS authentication server. To specify an NIS authentication server, use /etc/yp.conf which contains the line: ypserverip.address.of.server. Find with ypwhich

On a UNIX system, everything is a file; if something is not a file, it is a process."

This statement is true because there are special files that are more than just files (named pipes and sockets, for instance), but to keep things simple, saying that everything is a file is an acceptable generalization. A Linux system, just like UNIX, makes no difference between a file and a directory, since a directory is just a file containing names of other files. Programs, services, texts, images, and so forth, are all files. Input and output devices, and generally all devices, are considered to be files, according to the system.

The ping command tests the connection between the local machine and a remote address or machine.

The traceroute command expands on the functionality of the ping command. It provides a report on the path that the packets take to get from the local machine to the remote machine. Each step (intermediate server) in the path is called a hop. Route information is useful when troubleshooting a networking issue: if there is packet loss in one of the first few hops the problem is often related to the user’s local area network (LAN) or Internet service provider (ISP). By contrast, if there is packet loss near the end of the route, the problem may be caused by an issue with the server’s connection.

Add a comment
Know the answer?
Add Answer to:
Linux Describe the uses of policy documents and the procedure documents in system administration and provide...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT