SYstem administratioon technical questions

docx

School

Rochester Institute of Technology *

*We aren’t endorsed by this school

Course

0303-784

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by DukeIbis3810

Report
1. Can you explain the process of setting up automated backups for critical data on Linux servers? Ans. To set up automated backups first I would be setting up backups , I would do this through the use of tools like cron job to schedule backup tasks at regular intervals. This could be done by creating a cron job backup that will run a script that backs up specific directories and files to a designated storage location, this could be an external driver or cloud storage. I would then use something like rsync to have file synchronization and efficient backup. By automating this process we will be able to make sure that critical data is backed up and stored safely in an external storage environment, which will prevent data loss due to weather conditions, data corruption etc. Cron job: A cron job is a scheduled task or job that the operating system runs automatically at predetermined times or intervals. Use crontab to set this up Rsync: also known as remote synchronization, is a command line tool that is used for copying and synchronizing files and directories between different locations either locally or between different systems on the network. rsync [options] source destination 2. How would you troubleshoot a server experiencing high CPU utilization? Ans. High CPU utilization can happen due to a lot of reasons, like resource intensive processes or system bottlenecks . To trouble shoot I would first start by identifying the processes that are consuming the most CPU usage through using tools like top or htop . From there I would analyze and see what the nature of these processes is to decide if they are legitimate or just taking up space and inefficient like a runaway script or malware . In addition to this I would check the system logs to see if any error messages are being formed related to the source usage . Depending on what I find I will take appropriate actions such as optimizing configurations , or processes, tuning resource allocations (deciding where resources will be allocated) or isolating problematic processes. This would help mitigate CPU usage from spiking and restore optimal system performance. Top: a command that displays a dynamic, real time view of system processes and resource usage. Htop: is an interactive process viewer and system monitor that provides a more user-friendly and feature rich alternative to top Both of these are used to see live cpu usage 3. Can you explain the concept of virtualization and its benefits in a server environment? Ans. Virtualization involved creating virtual instances of computing resources, this can be a server, storage or networks. The primary benefit of virtualization is resource optimization and strengthening, virtualization allows multiple virtual machines run processes on a single physical server. This enables more efficient use of hardware resources, reduces hardware costs and simplifies management of IT resources. Additionally virtualization improves scalability and flexibility because vms can be duplicated, restored, backed up and deployedand migrated easily. In general virtualization improves resource utilization in server environments making it a very important piece of technology for modern sys administrators. https://chat.openai.com/c/e6662c20-024a-4490-8d5d-b8e020bcc196
What is active Directory? Ans. Active Directory is a service developed by Microsoft for managing users, computers and and resources in a network. It acts as a central database that allows administrators to control access, enforce policies, and organize information within a Windows-Based environment. It stores and manages directory data and objects on the network. What are forests, trees and domains? ANS. These are an active directory’s divisions, a domain is a logical group of network objects with the same Active Directory database, a tree is a cohesive group of domains, and a bunch of trees make up the structure of a forest. Object- An object is referred to as any entity that is stored within an Active directory database. This can include users, groups, printers and other resources that are managed and organized within the active directory. Each object in active directory has its own attributes like the user’s username, password, email address, group memberships etc. How would you troubleshoot an issue with a server or other hardware component. Ans. I would start by identifying the problem and gathering information about the issue, determine what symptoms and errors are occurring and how they are affecting the system. I would do this through user reports and monitoring tools. Then I would check my connection and cables making sure that all of them are secure and connected. Loose or faulty connections can cause issues too I would then review system logs and see if any error messages appeared to give a clue about the issue at hand. Logs are able to provide valuable information about system errors, crashes and failures. The logs I would be using are System logs, event logs or error messages. I would run diagnostics to test the hardware, I would isolate the problem, inspect the damage and finally get to fixing by consulting documentation. How would you update or install or backup or recover info on computer: I would most likely create a script or use an automated tool for it so that it can be done more efficiently and faster without the high chance of human error. I have experience with scripting and automating processes before thanks to my task automation class. For scripting I would most likely use powershell for windows and Bash and python for linux 4. Are you familiar with virtualization technologies such as VMware, Hyper-V, or Citrix? Practically, I have used VMware Workstation to run virtual machines on which I scripted and automated tasks. I have also used virtual machines through my schools remote laboratory system emulator or rles. I have done research on Vmware’s vsphere and am going to be learning more about it in my system administration class this semester. 5. What strategies do you use to ensure that all systems are up to date with the latest patches and security updatesa varie
Ans. I keep up to date with the latest security threats, news and trends. I would also use automated tools that regularly scan for vulnerabilities in my system and let me know if any issues have been found. Implementing a comprehensive plan to make sure that the system is upto date and protected periodically is the best way to ensure all systems are protected and up to date. 6. How would you protect against malware and other threats? Ans. I would take the appropriate security measures such has having virus detectors, firewall and other methods of protecting my computer. I am also well aware of a variety of security protocols such as two factor authentication, encryption and regularly monitoring the system for malicious activity. 7. How do you monitor and finish any issues before they become a problem? I use a combination of application and system monitoring tools to proactively identify potential issues before they become problems. I also regularly review system logs and performance metrics to identify any abnormal activity or behavior. Additionally, I do regular maintenance on all systems to ensure they are running optimally. Through my experience as a system administrator, I have developed strategies to ensure that any potential issues are identified and addressed before they become a problem. This helps to ensure that system performance is always at its best.” 8. Explain the firewall? A firewall is a network security device or software that monitors and controls incoming traffic and outgoing traffic network traffic based on predetermined rules. It’s main purpose is to create a barrier between a trusted internal network and a unknown external network, like the internet. It helps prevent unauthorized access and protects against cyber attacks. The way a firewall works is: Packet Inspection- firewall inspects the packets information as it goes in and out of the wall like source destination and the type of data it is carrying Rule-Based Filtering- Based on predetermined rules it will block or allow packets to pass through Stateful Inspection- keeping track of the state of active connections Logging and Reporting- Firewalls often include logging and reporting features that saves the history of network traffic. 9. Coursework in a relatable program such as systems engineering, network engineering and or Information technology / Software Engineering: - Software Development and problem solving in java and python - System administration - Introduction to Database Modeling - Task automation and interpretive languages - Web and mobile computing, html, javascript, php - Information security and Assurance - Routing and Switching
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help