Install a Fedora Linux Operating System on a Server
1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?
So that all events have a proper timestamp for documentation.
2. During the install, a password has been set for the â€œrootâ€ user. What is the â€œrootâ€ user, and when is it appropriate to use this account?
The root user or super user has access to all commands and files on a Linux operating system. It is used when making changes to the system and installing software in RPM (Redhat Package Manager).
3. During the install, X-Window and a Desktop Manager were installed. However, in a production environment it is recommended NOT to run the X-Window environment. Explain the purpose of this recommendation.
It is recommended to not run this because of the vulnerabilities it poses.
4. During the installation process it asks what the options ...view middle of the document...
The swap file is a special file in the filesystem that resides amongst your system and data files.
7. What are some of the benefits and features that are available to Linux users by selecting the ext4 file system for the partitioning of a Linux system?
Large file system, backwards compatibility with ext3 and ext2, extents, and delayed allocation.
8. How is the passwd file used, and what fields make up its content? Explain.
The /etc/passwd is a text file that contains a list of the system's accounts, giving for each account some useful information. There are 7 fields: Username, password, User ID, Group ID, user id info, home directory, and command/shell
9. What is the fstab file used for and what fields make up its content? Explain.
Fstab is a system configuration file on Linux that contains information about major filesystems on the system. There are 6 fields: physical location of each filesystem, the mount point, the filesystem type, designation of who and how the filesystem can be used, determines use of dump command for backup, order in which the computer checks the filesystems.
10. Explain the significance of creating separate partitions of the /var and /boot directories? What is contained within these directories?
/var is where spool directories such as those for mail and printing go. In addition, it contains the error log directory and /boot is where your kernel images and boot loader configuration go. Having these in their own partition holds a better hierarchy for the system. It adds to security and itâ€™s easier for backup and recovery.
11. How would selecting the option â€œencrypt filesystemâ€ be useful?
You can encrypt your filesystems this way.
12. How can partitioning with Logical Volume Manager (LVM) help as it relates to the CIA Triad of security?
It allows you to encrypt your data during install and partitioning helps make a more secure system.
13. What security advantages can be realized when selecting the â€œminimalâ€ software install option?
Fewer software packages, fewer potential errors and/or security issues
14. How could you automate a Fedora install geared for security?
Redhat satellite service
15. What is the purpose of â€œfirstbootâ€?
It allows you to configure more things than the installer.