System Administration Basics

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which task is least likely to be performed by a System Administrator?

  • Updating operating systems and applying security patches
  • Troubleshooting system-related issues
  • Developing new application software from scratch (correct)
  • Managing user accounts and permissions

A company wants to improve their data security. Which System Administrator role is MOST directly responsible for implementing security measures and training staff on secure procedures?

  • Network Administrator
  • Database Administrator
  • Security Administrator (correct)
  • System Administrator

Ensuring data integrity falls under which aspect of information security?

  • Knowing who can access or copy transcripts appropriately.
  • Anticipating failures, which ensure system and data dependability.
  • Maintaining trustworthy and unchanged information. (correct)
  • Restricting access from unauthorized users to protected data.

A company's file server crashed, and users cannot access important documents. Which System Administrator task is MOST relevant to quickly resolving this issue?

<p>Performing regular system backups. (C)</p> Signup and view all the answers

A System Administrator notices unusual activity in the system logs. What should they do FIRST?

<p>Analyze the system logs to identify potential security breaches or system issues. (C)</p> Signup and view all the answers

A company wants to implement a solution that automatically checks systems for potential security weaknesses. Which of the following tools would a System Administrator MOST likely use?

<p>A vulnerability scanner (A)</p> Signup and view all the answers

A user reports that they can no longer access a shared folder on the network. What is the MOST likely first step a System Administrator would take to troubleshoot this issue?

<p>Check the user's permissions for the shared folder. (C)</p> Signup and view all the answers

Which of the following is the MOST important reason for a System Administrator to maintain detailed system documentation?

<p>To ensure consistent system configuration and facilitate troubleshooting. (A)</p> Signup and view all the answers

A company wants to ensure that its systems are protected against the latest security threats. What should the System Administrator do?

<p>Regularly update the operating system and application software. (B)</p> Signup and view all the answers

What is the purpose of a Remote Desktop Connection Broker (RDCB)?

<p>To direct incoming remote desktop connections to an available host. (A)</p> Signup and view all the answers

What is the primary purpose of a DNS server?

<p>To translate domain names into IP addresses. (A)</p> Signup and view all the answers

What is the purpose of the Get-Help cmdlet in PowerShell?

<p>To display help information for cmdlets and scripts (D)</p> Signup and view all the answers

In PowerShell, what is the primary purpose of a 'ForEach' loop?

<p>To iterate through collections like arrays or output from commands. (C)</p> Signup and view all the answers

A System Administrator needs to create a new directory using PowerShell. Which cmdlet should they use?

<p>New-Item (B)</p> Signup and view all the answers

A System Administrator wants to list only the directories in a specified path, excluding files. What PowerShell command should they use?

<p>Get-ChildItem -Path C:\path\to\folder -Directory (B)</p> Signup and view all the answers

A System Admin wants to output the text "File created at: C:\temp\myfile.txt". Which of the following powershell commands would accomplish this?

<p>Write-Host &quot;File created at: C:\temp\myfile.txt&quot; (C)</p> Signup and view all the answers

How can a System Administrator check the currently configured PowerShell execution policy?

<p>Using the <code>Get-ExecutionPolicy</code> command. (C)</p> Signup and view all the answers

What is the default PowerShell execution policy?

<p>Restricted (D)</p> Signup and view all the answers

A system administrator wants to create a PowerShell variable named 'serverName' to store the name of a server. Which of the following is the correct syntax?

<p>$serverName = &quot;MyServer&quot; (D)</p> Signup and view all the answers

A System Administrator needs to block outbound connections for a specific application (firefox.exe) using the Windows Firewall. Which PowerShell command is MOST appropriate?

<p>New-NetFirewallRule -Program 'C:\Program Files (x86)\Mozilla Firefox\firefox.exe' -DisplayName 'Block Firefox' -Direction Outbound -Action Block -Profile Domain,Private (A)</p> Signup and view all the answers

Flashcards

System Administrator

Responsible for user management, system security, managing computer resources, and user support.

System Administration Duties

Analyzing system logs, integrating new technologies, performing backups, updating OS, installing hardware/software, managing email, and enforcing security.

System Admin Skills

Knowledge of OS, application software, troubleshooting, network management, and hardware.

System Administration (Definition)

A set of functions that provides support services, ensures reliable operations, promotes efficient system use, and meets service-quality objectives.

Signup and view all the flashcards

Security Administrator

Security administrator is a specialist in computer and networks security.

Signup and view all the flashcards

Reactive vs Proactive Monitoring

Reactive detects and analyzes failures after they occur. Whereas Proactive tests a system for specific issues before they occur

Signup and view all the flashcards

Updates (Definition)

Replacing defective software components to remove vulnerabilities.

Signup and view all the flashcards

Configuration (Definition)

Selecting one among many possible combinations of features of a system

Signup and view all the flashcards

Access Control (Definition)

limiting access to information system resources only to authorized users

Signup and view all the flashcards

Windows Powershell (Definition)

A command-line shell and scripting language designed for system administration

Signup and view all the flashcards

Active Directory Domain Services (AD DS)

Provide authentication/authorization for users, computers, and network resources in a Windows-based domain environment.

Signup and view all the flashcards

DHCP Server (Definition)

Dynamically assigning IP addresses and network configuration settings to devices on a network.

Signup and view all the flashcards

DNS Server (Definition)

Translates human-readable domain names into numerical IP addresses.

Signup and view all the flashcards

Hyper-V (Definition)

Create and manage multiple virtual machines (VMs) on a single physical server.

Signup and view all the flashcards

Network Policy and Access Services (NPAS)

Helps administrators manage network access and security policies.

Signup and view all the flashcards

Remote Desktop Services (RDS)

Enables users to access applications and desktops hosted on a Windows server from remote locations.

Signup and view all the flashcards

Web Server (IIS)

Allows businesses to host websites, web applications, and services.

Signup and view all the flashcards

Study Notes

System Administrator Responsibilities:

  • Managing users and their access rights
  • Preserving system security, including access control, backups, and physical security
  • Administering computer resources like hardware, software, and network infrastructure
  • Providing user support for technical issues

Admin Privileges:

  • System administrators possess special privileges to fulfill their duties effectively

System Administration Core Tasks:

  • Examining system logs to identify and address potential problems
  • Integrating new technologies into existing systems
  • Performing regular data backups to prevent data loss
  • Applying updates, patches, and configuration changes to the OS
  • Installing and setting up new hardware and software
  • Monitoring and maintaining email and virus protection software
  • Managing user accounts by adding, removing, or updating them
  • Providing answers to technical inquiries from users
  • Enforcing security protocols to ensure system protection
  • System configuration and documentation
  • System performance tuning
  • Troubleshooting system issues to restore functionality
  • Ensuring continuous uptime of the network infrastructure

System Admin Skills:

  • Proficiency in operating systems
  • Application software management
  • Software troubleshooting
  • Network management
  • Hardware knowledge

System Admin Training:

  • Varied career paths
  • Options include a degree in IT or Computer Science
  • Specializations can be pursued through certifications

Cybersecurity Certifications:

  • Microsoft Certified Professional (MCP)
  • Red Hat Certification Program (RHCP)
  • Cisco Certified Network Associate (CCNA)
  • Sun Certified Network Administrator (SCNA)
  • Database Administrator: Oversees the data and system performance
  • Network Administrator: Takes care of the network infrastructure
  • Security Administrator: Keeps computer equipment and networks secure, apply security procedures, and does security awareness training

System Administration Definition:

  • Function set to support services
  • Promotes efficient system use to ensure reliable operations
  • Meeting prescribed service quality goals

Key Functions:

  • Installing, configuring, maintaining systems
  • Managing network equipment
  • Managing computer systems

System Administrators Defined:

  • Protect critical systems and are the initial line of defense for tech systems
  • Responsible for day-to-day tech system operations

System Security Officers:

  • Responsible for writing, enforcing, and reviewing security operating procedures in an organization

IT Personnel Importance:

  • Considered to be essential personnel as they ensure IT infrastructure remains operational

Relation to Information Security:

  • Acts as the first line of defense in maintaining confidentiality, integrity, and availability

Info security: Availability

  • Proactively preventing hardware failures from impacting end-users

Info security: Confidentiality

  • Using appropriate file permissions to protect sensitive information

Info security: Integrity

  • Preventing those not authorized from unauthorized access of information

System Admin Tasks: Installation

  • Writing necessary data in the appropriate locations on the hard drive
  • Installing OS
  • Installing application programs

System Admin Challenges:

  • Streamlining processes across numerous computers within an organization
  • Controlling resulting information security hazards

Configuration:

  • Selecting specific features of the system from among the many possible combinations.
  • System admins must understand the implications of these interactions

Access Control:

  • Limiting access to information system resources only to programs and users who are certified

Access Control Task:

  • Defining the actions that an authorized user can perform on a system

User Management:

  • Defining the organizational member rights to information in the organization
  • Key component of access controls
  • Creating and removing user accounts and updating permissions
  • Managing groups and users with similar privileges

System Monitoring:

  • Listening and recording system activities to maintain performance and security
  • Reactive monitoring involves problem notifications and log analysis

Proactive Testing:

  • Testing a system before issues occur via vulnerability and penetration testing

Updates:

  • Replacing defective software components to remove vulnerabilities detected during ongoing use and monitoring
  • Involves both Operation System (OS) updates, to fix low-level component issues

System Administrator Valued Gateway Client:

  • Maintaining the efficiency of Linux-based computer systems
  • They solve organizational issues directly by way of IS or IT departments
  • They train users, help them solve problems, inform management of technical developments, maintain system hardware, create user accounts, manage procedures, policies and systems planning

Ethics:

  • Trusted with large quantities of personal and business data
  • Workload is determined by legal and ethical standards

Linux System Key Attributes:

  • Utilities automate system admin tasks
  • Designed for multiple users
  • Commands are designed to perform one task only

Linux Configuration:

  • Service and program manage and create configuration information
  • System admins manage configuration files of programs in the /etc directory
  • A user's personal directory stores configuration files for user-specific programs

Understanding Files, Devices, and Processes:

  • A device is a hardware peripheral
  • Devices are accessed or created through /dev directory
  • Processes are the programs currently running on Linux
  • The daemon is a device in the background

Linux Processes:

  • Users can execute multiple programs at the same time
  • Root is used to manage processes on Linux
  • User that starts the process is the one that is associated with it

Windows PowerShell:

  • Command-line shell and scripting language for system administration
  • Designed especially for system administration

PowerShell Features:

  • It runs commands called as "cmdlets"
  • It has a rich expression parser and scripting language

Accessing PowerShell:

  • Access PowerShell by clicking the icon in the task bar and in the start menu
  • PowerShell ISE runs commands and debug script on the Windows-based graphic-user interface

PowerShell Cmdlets:

  • Get-Help provides an explanation of how to get a command and its parameter
  • Get-HotFix can get the list of updates, and install them

PowerShell Definiton:

  • A command-line interface combined with a scripting language

PowerShell Characteristics:

  • Processes objects instead of plain text commands
  • Automates common tasks, share data, and manage infrastructure as code

PowerShell: Cmdlets, Scripts:

  • Cmdlets are commands that are designed to return objects in PowerShell and perform specific actions
  • PS1 scripts combine cmdlets
  • The PowerShell environment works with each cmdlet

PowerShell Execution Policy:

  • The execution is restricted by default by the PowerShell for security measures

PowerShell Settings: Restricted

  • This no PowerShell scripts may be run

PowerShell Settings: All Signed

  • PowerShell scripts can be run by a trusted developer

PowerShell Settings: RemoteSigned

  • PowerShell scripts canb e run by scripts signed by a trusted developer

PowerShell Settings: Unrestricted

  • Any script can be ran

PowerShell Syntax:

  • Verb-Noun-Parameter1 Value1 -Parameter2 Value2

PowerShell Essential Commands:

  • Get-Help: Provides information about all cmdlets
  • Get-Command: Lists available commands
  • Get-Member: Shows the features of objects

PowerShell Variables:

  • Use $ symbol
  • Case-insensitive

PowerShell Operators:

  • Arithmetic (+, -, *, /, %) for calculations
  • Comparative (-eq, -ne, -gt, -It, -ge, -le) for comparing values
  • Logical (-and, -or, -not) for combining conditions

PowerShell ISE: Features: Multi-pane interface,

PowerShell ISE: Features

  • Has a features of Multi-pane interface and auto complete

PowerShell Types:

  • Have For, While, and ForEach loops, that allow for specific parameters to repeat
  • Has If-ELSE statements that execute code blocks

PowerShell Debugging: Syntax errors,

PowerShell Issues: Debugging:

  • Requires the identification of issues with typing parentheses
  • Requires the management of variables, requires proper import of modules to prevent failure to execute commands

Defining the Item Path: File

  • Create New File: New command and definition of parameter

Defining the Item Path: Firewall, Get-Service, Get-WmiObject, Get-ComputerInfo:

  • Create New Command and definition of parameter

Motivation

  • Adding Remote Desktop Management To Easily update the system
  • To watch what the users are doing, stop them from getting to bad sites, fast update to computers
  • To provide security in Linux

Sessions in Windows:

  • This consists of enabling centralized application management, helps to keep data in the data center and provides connection brokering for Virtual Desktop Infrastructure

Windows Virtual Desktop Infrastructure

  • Consists of virtual machine-based and centralized desktops with roll backs to keep the state clean

Windows Remote Desktop Host Session (RDSH)

  • Consists of being the major component for running User apps

Windows Remote Desktop Connection Broker:

  • Manages RDS farms
  • Distributes work load
  • Reconnects users to their sessions
  • Stores collection settings
  • Publishes apps

Windows Remote Desktop licensing (RD Licensing)

  • Managing RDS licenses

Requirements to Creating Windows RDS:

  • You must use same RDS hosts and configured them
  • All hosts must moved to the same OU with Active Directory
  • One should use one group, if roaming, share new folder to AD group

Active Directory:

  • Manages permissions and security settings
  • Has centralized policy

DHCP Server:

  • This server dynamically assigns IP addresses

DNS Server:

  • This server translates domain names into IP addresses

Hyper-V:

  • Averts hardware and manages virtual machines

NPAS

  • Controls the Windows tool suite that help make the network access/policies secure

RDS

  • Provides accesses to remote applications and desktops

IIS

  • Manages website protocols and hosting

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

IP Telephony Operations and Management
10 questions
System Administration Basics
20 questions
System Administration
10 questions

System Administration

WorldFamousBowenite8421 avatar
WorldFamousBowenite8421
Use Quizgecko on...
Browser
Browser