COURSE 3 – CYBERSECURITY COMPLIANCE FRAMEWORK & SYSTEM ADMINISTRATION

Module 3: Server and User Administration

IBM CYBERSECURITY ANALYST PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Server and User Administration

In this module, you’ll delve into user management for both Windows and Linux systems. Additionally, you’ll gain insights into security vulnerabilities inherent in these operating systems and key components crucial for honing your skills in the cybersecurity domain.

Learning Objectives

  • Execute common Linux commands on the terminal
  • Explain how to install and set up Samba so that Linux and Windows systems can communicate over a network
  • Recall the functions of basic Linux shell commands
  • Describe common shell choices within Linux
  • Explain what happens at each Linux run level
  • Describe Linux’s file system and directory structure
  • Explain what the Linux kernel and shell do
  • Summarize why organizations use Linux
  • Describe the nine types of Windows security events that administrators can audit
  • Explain why an organization should have a security auditing policy
  • Discuss how to locate and view Windows Server logs
  • Describe server logs in the context of network administration
  • Define Kerberos authentication and describe its benefits for Windows security and compliance
  • Summarize what makes Windows Admin Center useful for server management
  • Explain scope as it relates to Active Directory groups
  • Describe the two types of Active Directory groups
  • Summarize guidelines for restricting and protecting sensitive domain accounts using Active Directory
  • Differentiate the four types of Active Directory accounts
  • Describe key features of Active Directory
  • Explain how Active Directory works
  • Describe features of the Windows Security app
  • Discuss security considerations for managing local Windows systems
  • Describe default local accounts within Windows
  • Define local user accounts within Windows
  • Describe the principle of least privilege and its benefits for network administration
  • Define Windows privileged accounts
  • Explain how authentication and authorization work in Windows Access Control
  • Summarize how Windows handles the separation of 32-bit and 64-bit applications
  • Describe the Windows directory structure
  • Contrast the NTFS and FAT file systems that Windows uses
  • Define file system and hierarchical structure
  • Compare and contrast Windows’s two modes: user and kernel

WINDOWS ADMINISTRATION

1. Which three (3) objects are typically managed by active directory?

  • Network User (CORRECT)
  • Local Accounts
  • Services (CORRECT)
  • Volumes (CORRECT)

Correct, this one of the objects managed by active directory. 

2. Which type of group within Active Directory is used to assign permissions to shared resources?

  • Service groups
  • Data groups
  • Distribution groups
  • Security groups (CORRECT)

Correct, this is a type of group used to assign permissions to shared resources.

3. Kerberos Authentication provides several benefits including which three (3) of the following?

  • single sign on (CORRECT)
  • delegated authentication (CORRECT)
  • distributed authentication
  • interoperability (CORRECT)

Partially correct, this is a benefit of Kerberos Authentication.

4. Which of the nine different kinds of Windows events that can be audited is used to see when someone has shutdown or restarted the computer or when a program tries to do something it does not have permission to do?

  • Policy change
  • Privilege Use
  • System events (CORRECT)
  • Process tracking

Correct, this is an event used to audit someone shutting down or restarting a computer.

LINUX BASICS

1. True or False:  Internal commands are built into the shell program and are shell dependent?

  • False
  • True (CORRECT)

Correct, Internal commands are built into the shell program.

2. Which Linux Run Level shuts down all services when the system is being rebooted?

  • Run Level 0: Halt
  • Run Level 1:  Single User
  • Run Level 5:  Graphical
  • Run Level 6:  Reboot (CORRECT)

Correct, reboot does shut down all services.

SERVER AND USER ADMINISTRATION

1. Which Windows directory folder stores per-user application data and settings?

  • \Users
  • \Program Files
  • \System
  • \AppData (CORRECT)

2. Which is NOT an example of a default Windows local user account?

  • Guest
  • HelpAssistant
  • Administrator
  • Network Service (CORRECT)

3. Which feature allows Active Directory to be shared by multiple servers?

  • A Set of rules
  • A query and index mechanism
  • A replication services (CORRECT)
  • A global catalog

4. What tool can an administrator use to manage servers on private networks that are not connected to the Internet?

  • AWS Active Directory
  • Windows Admin Center (CORRECT)
  • Network Admin Center
  • Privileged Admin Center

5. Which of the nine different kind of Windows events that can be audited is used to see each instance of a user logging on to and logging off from another computer?

  • Directory service access
  • Object access
  • Account management
  • Account logon (CORRECT)

6. Which of these commands does not shutdown the Linux operating system?

  • reboot
  • grep (CORRECT)
  • shutdown -r
  • init 6

7. Which Linux commands are totally shell-independent and usually found in any Linux distribution?

  • Internal commands
  • External commands (CORRECT)

CONCLUSION – Server and User Administration

In conclusion, mastering user management for both Windows and Linux systems, along with understanding the associated security vulnerabilities and key components, is vital for anyone seeking proficiency in the cybersecurity industry.

By comprehensively addressing these aspects, you’ll be better equipped to navigate the complexities of securing various operating environments effectively.