0% found this document useful (0 votes)
23 views53 pages

Lecture 2 Cyber Security

cyber security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
23 views53 pages

Lecture 2 Cyber Security

cyber security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 53
Systems Administration BS Information System Instruc Mark Jahn P. Lado System Administrator Responsibilities * Install and configure software and hardware * Manage network servers and technology tools * Set up accounts and workstations * Monitor performance and maintain systems according to. requirements * Troubleshoot issues and outages * Ensure security through access controls, backups and firewalls + Upgrade systems with new releases and models * Develop expertise to train staff on new technologies * Build an internal wiki with technical documentation, manuals and IT policies Differentiate between NTFS & FAT. * NTFS- New Technology File System is the current file system used by Windows. It offers features like security permissions (to limit other users' access to folders), quotas (so one user can't fill up the disk), shadowing (backing up) and many other features that help Windows. Differentiate between NTFS & FAT. * FAT32 - File Allocation Table is the older Microsoft file system, primarily used by the Windows 9X line and Window could be installed on a FAT32 partition up to XP. In comparison, FAT32 offers none of what was mentioned above, and also has a maximum FILE (not folder) size of 4GB, which is kind of small these days, especially in regards to HD video. What Is VOIP? * VOIP - Short for Voice Over Internet Protocol, a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions. What is loop back? Loopback address is 127.0.0.1, * Anaddress that sends outgoing signals back to the same computer for testing. What is Proxy Server? * A proxy server is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees’ use of outside resources. Differentiate between FIREWALL/ANTIVIRUS. * Antivirus: The prime job of an antivirus is protect your system from computer viruses. Your computer may be standalone or part of network or connected to Internet you need an antivirus program. It actively monitors when you are using your system for any virus threat from different sources. if it found one it tries to clean or quarantine the virus ultimately keeping your system and data safe. Differentiate between FIREWALL/ANTIVIRUS. * Firewall: Firewall is in other hand a program which protects your system from outsider/intruder/hacker attacks. These attacks may not be virus type. In some cases hackers can take control of your system remotely and steal your data or important information from system. If your system is directly connected to internet or a large network than you can install a software firewall in your PC to. protect yourself from unauthorized access. Firewall is available either in software or in hardware form. For a single PC you may need a software firewall while a large corporate implements hardware firewall to protect all of their systems from such attacks. Differentiate between Frond end & Back End Server. * Backend server: A back end server is a computer resource that has not been exposed to the internet. In this regard the computing resource does not directly interact with the internet user. It can also be described as a server whose main function is to store and retrieve email messages. Differentiate between Frond end & Back End Server. * Frontend server: A frontend server is a computer resources that has exposed to the internet. What is APIPA? * Stands for Automatic Private IP Addressing APIPA is a DHCP fail over mechanism for local networks. With APIPA, DHCP clients can obtain IP addresses when DHCP servers are non-functional. * APIPA exists in all modern versions of Windows except Windows NT. * When a DHCP server fails, APIPA allocates IP addresses in the private range 169.254.0.1 to 169.254.255.254. How Release and renew IP address from Command prompt? * Ipconfig / release ipconfig / renew What is wins server? * Windows Internet Name Service (WINS) servers dynamically map IP addresses to computer names (NetBIOS names). This allows users to access resources by computer name instead of by IP address. If you want this computer to keep track of the names and IP addresses of other computers in your network, configure this computer as a WINS server. If you do not use WINS in such a network, you cannot connect to a remote network resource by using its NetBIOS name. System Volume Information (SVI) Folder. * Windows XP includes a folder named System Volume Information on the root of each drive that remains hidden from view even when you choose to show system files. It remains hidden because it is not a normally hidden folder you can say it is a Super Hidden Folder. Windows does not shows Super Hidden Folders even when you select "Show Hidden Files." What is the Windows Registry? * The Windows Registry, usually referred to as "the registry," is a collection of databases of configuration settings in Microsoft Windows operating systems. What is MBR? * Short form Master Boot Record, a small program that is executed when a computer boots up. Typically, the MBR resides on the first sector of the hard disk. The program begins the boot process by looking up the partition table to determine which partition to use for booting. What is Bit Locker? * BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7 and Vista, To encrypt an entire drive, simply right-click on the drive and select Turn on BitLocker from the context menu. Difference between SATA and IDE. * IDE and SATA are different types of interfaces to connect storage devices (like hard drives) to a computer's system bus. SATA stands for Serial Advanced Technology Attachment (or Serial ATA) and IDE an acronym for Integrated Drive Electronics and also called Parallel ATA or PATA. SATA is the newer standard and SATA drives are faster than PATA (IDE) drives. For many years ATA provided the most common and the least expensive interface for this application. But by the beginning of 2007, SATA had largely replaced IDE in all new systems. Main Difference Between Windows server 2008 and 2012 * 1) New Server Manager: Create, Manage Server Groups 2) Hyper-V Replication : The Hyper-V Replica feature allows you to teplicate a virtual machine from one location to another with Hyper-V and a network connection—and without any shared storage required. This is a big deal in the Microsoft world for disaster recovery, high availability and more, VMware does this, too, but the vendor charges new licensees extra for the capability. 3) Expanded PowerShell Capabilities 4)IIS 8.0 and IIS 7 in 2008 5)Hyper-V 3.0 6)PowerShell 3.0 How Long My Computer Has Been Running? Get to Know My Computer’s Uptime. * Start Taskmanager, andselect Performance tab . In performance tab we can see system up time Method 2: By typing system info in command prompt we can find out up time of your server In system boot time. How to navigate event viewer in Windows server? * Control panel -> Administrative tools ->Computer Management -> event Viewer Three types events 1. Error. 2. Warning. 3. Information. What happens when we type URL in browser? * First the computer looks up the destination host. If it exists in local DNS cache, it uses that information. Otherwise, DNS querying is performed until the IP address is found. Then, your browser opens a TCP connection to the destination host and sends the request according to HTTP 1.1 (or might use HTTP 1.0, but normal browsers don't do it any more). What happens when we type URL in browser? * The server looks up the required resource (if it exists) and responds using HTTP protocol, sends the data to the client (=your browser) * The browser then uses HTML parser to re-create document structure which is later presented to you on screen. If it finds references to external resources, such as pictures, css files, javascript files, these are/is delivered the same way as the HTML document itself. DHCP How DHCP work? * DHCP Stands for Dynamic host configuration protocol. * DHCP is a protocol used for automatic configuration IP address in client computers connected to IP networks. * DHCP operates on a client server model in four phases. How DHCP work? * Discover: A client broadcasts DHCP Discover message when it comes alive on the network. * Offer: When a DHCP server receives the DHCP Discover message from the client, it reserves an | P address for the client and sends a DHCP Offer message to the client offering the reserved IP address. * Request: The client receives the DHCP offer message and broadcasts a DHCP request message to show its consent to accept the offered IP address. * Acknowledge: When the DHCP server receives the DHCP Request message from the client, it sends a DHCP Ack packet to the client. At this point the IP configuration process is complete. Ack? * In the TCP protocol, the receiving computer sends an ACK (acknowledgment) to the sending computer. This is basically how a connection is established. What is DHCP Scope? * Arange of IP address that the DHCP server can assign to clients that are on one subnet. What protocol and port does DHCP use? * UDP protocol and 67 port in client and 68 port in server. UDP protocol? * In computer networking, the User Datagram Protocol is one of the core members of the Internet protocol suite. The protocol was designed by David P. Reed in 1980 What is a DHCP lease? * A DHCP lease is the amount of time that the DHCP server grants to the DHCP client permission to use a particular IP address. A typical server allows its administrator to set the lease time. What is Authorizing DHCP Servers in Active Directory? * If a DHCP server is to operate within an Active Directory domain (and is not running on a domain controller) it must first be authorized to Active directory. How to Backup and Restore DHCP in Windows Server 2008? * In Windows Server 2008, backup of DHCP database and settings has gotten simpler. You may want to backup your DHCP server from time to time to prepare for disaster recovery scenarios or when migrating DHCP server role to a new hardware. How to Backup and Restore DHCP in Windows Server 2008? * Backup DHCP Server 1. Open Server Manager > DHCP role 2. Right click server name, choose Backup.. 3. Choose a location for backup, click OK How to Backup and Restore DHCP in Windows Server 2008? * Restore DHCP Server 1. Open Server Manager > DHCP role 2. Right Click server name, choose Restore 3. Choose the location of the backup, click OK 4. Restart the DHCP Service How to Backup and Restore DHCP in Windows Server 2008? * DHCP Database location: C:\WINDOWS\System32\DHCP directory. DNS Define DNS * Domain Name System, DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. Two types of lookup in DNS * Forward lookup : it converts Domain name to ip address. * Reverse lookup: it converts ip address to Domain name. Three types of zone * Primary zone * Secondary zone * Stub zone. What is the port no of DNS? * UDP and port number - 53 What is Nslookup? Nslookup.exe is a command-line administrative tool for testing and troubleshooting DNS servers. This tool is installed along with the TCP/IP protocol through Control Panel. Active directory And Domain What is LDAP? Why it is used. * LDAP is the Lightweight Directory Access Protocol. Its an active directory protocol. Basically, it's a protocol used to access data from a database . What is Active Directory? Why it used. * Active Directory is a Directory Service created by Microsoft. It is included with most Windows Server operating systems. What is Active Directory? Why it used. * Active Directory is primarily used to store directory objects like users and groups and computers printers. * Using Active Directory brings a number of advantages to your network; 1. Centralized user account management 2. Centralized policy management (group policy) 3. Better security management What is Group Policy? * Group Policy is a feature of the Microsoft Windows NT family of operating systems that control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications, and users’ settings in an Active Directory environment. What is the order in which GPOs are applied? . Local Group Policy object Site Domain . Organizational units. Bowne What is the difference between software publishing and assigning? * Assign Users The software application is advertised when the user logs on. It is installed when the user clicks on the software application icon via the start menu, or accesses a file that has been associated with the software application. What is the difference between software publishing and assigning? * Assign Computers The software application is advertised and installed when it is safe to do so, such as when the computer is next restarted. What is the difference between software publishing and assigning? * Publish to users The software application does not appear on the start menu or desktop. This means the user may not know that the software is available. The software application is made available via the Add/Remove Programs option in control panel, or by clicking on a file that has been associated with the application. Published applications do not reinstall themselves in the event of accidental deletion, and it is not possible to publish to computers.

You might also like