Categories
Linux

Describe three different types of Red Hat Linux servers. Provide examples of how

Describe three different types of Red Hat Linux servers. Provide examples of how each type is used within an organization.
Explain what a Linux Application server is and how it is used in an organization.
Explain in detail why you would recommend that your organization set up and maintain a dedicated Linux Application Server.
Please be sure to validate your opinions and ideas with citations and references in APA format.

Categories
Linux

Describe three different types of Red Hat Linux servers. Provide examples of how

Describe three different types of Red Hat Linux servers. Provide examples of how each type is used within an organization.
Explain what a Linux Application server is and how it is used in an organization. Explain in detail why you would recommend that your organization set up and maintain a dedicated Linux Application Server.
Please be sure to validate your opinions and ideas with citations and references in APA format.

Categories
Linux

The below are the entries of a log file (sample.log), where the last column (log

The below are the entries of a log file (sample.log), where the last column (login, payment…) is the service name and the last but one column (90721, 84721 …) is the response time.
168.1.1.2 – – [13/Feb/2022 19:46:43] “post /xyz/abin/login HTTP/1.1” 200 604 90721 “login”
168.1.1.2 – – [13/Feb/2022 19:47:45] “post /xyz/abin/payment HTTP/1.1” 200 604 84721 “payment”
168.1.1.2 – – [13/Feb/2022 19:48:12] “post /xyz/abin/createAccount HTTP/1.1” 200 604 86721 “createAccount”
168.1.1.2 – – [13/Feb/2022 19:49:03] “post /xyz/abin/createAccount HTTP/1.1” 501 604 86420 “createAccount”
168.1.1.2 – – [13/Feb/2022 19:51:13] “post /xyz/abin/balanceCheck HTTP/1.1” 200 604 34721 “balanceCheck”
168.1.1.2 – – [13/Feb/2022 19:52:12] “post /xyz/abin/login HTTP/1.1” 404 604 90721 “login”
168.1.1.2 – – [13/Feb/2022 19:52:43] “post /xyz/abin/payment HTTP/1.1” 500 604 84602 “payment”
168.1.1.2 – – [13/Feb/2022 20:06:40] “post /xyz/abin/login HTTP/1.1” 200 604 90671 “login”
168.1.1.2 – – [13/Feb/2022 20:36:33] “post /xyz/abin/payment HTTP/1.1” 200 604 84701 “payment”
168.1.1.2 – – [13/Feb/2022 20:18:19] “post /xyz/abin/createAccount HTTP/1.1” 200 604 86521 “createAccount”
We need unix script to print following output as a table:
1) Find Average response time per each service for every minute.
2) Find number of requests per each service for every minute.

Categories
Linux

Please respond to two posts from the attached pdf file What strengths do you see

Please respond to two posts from the attached pdf file
What strengths do you see in the original discussion of the strategies and why would you consider those strategies to be strengths?
List at least 3 questions that you would ask of the student who posted the original discussion.
Explain at least two ways that you agree with the original discussion.
Please be sure to validate your opinions and ideas with citations and references in APA format.

Categories
Linux

List and discuss five ways to harden the Linux operating system for security pur

List and discuss five ways to harden the Linux operating system for security purposes after a default installation different from the default security out-of-the-box.
Discuss in detail at least two different ways to install.
Explain in detail how you will use automation to install Linux on 500 computers as a Linux Administrator.
Provide details on how you will go about it considering failed installations.
Please be sure to validate your opinions and ideas with citations and references in APA format.

Categories
Linux

List and discuss five ways to harden the Linux operating system for security pur

List and discuss five ways to harden the Linux operating system for security purposes after a default installation different from the default security out-of-the-box.
Discuss in detail at least two different ways to install.
Explain in detail how you will use automation to install Linux on 500 computers as a Linux Administrator.
Provide details on how you will go about it considering failed installations.
Please be sure to validate your opinions and ideas with citations and references in APA format.

Categories
Linux

Make a game. You must include the following in your script game: 1. Conditional

Make a game.
You must include the following in your script game:
1. Conditional checking
2. Iteration
3. User Input
4. Output dependent on input
5. Ask the user if he/she wants to play again. This DOESN’T count for iteration.
The game must last a reasonable amount of time. Asking a question and spitting output back, ending the game, doesn’t cut it.
It must be original and can’t be remotely similar to anything we did in class!
EVERY BLOCK OF CODE MUST BE DOCUMENTED – COMMENTING IS MANDATORY
You’d need at least 100 lines of meaningful code.
Upload the file as a .txt

Categories
Linux

Make a game. You must include the following in your script game: 1. Conditional

Make a game.
You must include the following in your script game:
1. Conditional checking
2. Iteration
3. User Input
4. Output dependent on input 5. Ask the user if he/she wants to play again. This DOESN’T count for iteration.
The game must last a reasonable amount of time. Asking a question and spitting output back, ending the game, doesn’t cut it.
It must be original and can’t be remotely similar to anything we did in class!
EVERY BLOCK OF CODE MUST BE DOCUMENTED – COMMENTING IS MANDATORY
You’d need at least 100 lines of meaningful code.
Upload the file as a .txt

Categories
Linux

With security as one of the hottest topics in modern times, how will you use the

With security as one of the hottest topics in modern times, how will you use the Linux SELinux feature in your organization?
Research modern Linux storage strategies. Select two of these and discuss what they are, how they work, at least two advantages, and two disadvantages of each of these storage strategies.
Explain how you will use this as a Linux System Administrator practically.
Please be sure to validate your opinions and ideas with citations and references in APA format.

Categories
Linux

With security as one of the hottest topics in modern times, how will you use the

With security as one of the hottest topics in modern times, how will you use the Linux SELinux feature in your organization?
Research modern Linux storage strategies. Select two of these and discuss what they are, how they work, at least two advantages, and two disadvantages of each of these storage strategies.
Explain how you will use this as a Linux System Administrator practically.
Please be sure to validate your opinions and ideas with citations and references in APA format.