Saturday, September 29, 2007

Systems Administration and Security

Identify the features of the Network Information Service (NIS).
Identify the guidelines for configuring the Network Information Service (NIS).
Identify the features of the Name Service Switch (NSS) file.
Identify measures that can be taken to maintain basic host security.
Identify the features of user authentication with Pluggable Authentication Modules (PAM).
Identify the features of the Internet daemon (inetd) program.
Identify the features of tcp_wrappers.
Identify the features of the Lightweight Directory Access Protocol (LDAP).
Identify the features of the Secure Shell (SSH) protocol.
Identify the security strategy for running services.
Identify the function of the set group id (setGID) bit scheme.
Identify the features of the Computer Oracle and Password System (COPS).
Identify the features of user process accounting in RedHat Linux.
Set the system time in RedHat Linux.
Identify the features of system log files.
Configure automatic management tasks for log files by using logrotate.
Configure the swatch utility.

No comments: