ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Case Study of Sudo Group

Essay by   •  May 20, 2017  •  Case Study  •  427 Words (2 Pages)  •  990 Views

Essay Preview: Case Study of Sudo Group

Report this essay
Page 1 of 2

Ques1. Why were the Linux accounts you created added to the sudo group?

    The Linux accounts created were added to the sudo group because of the following reasons:

  • Permitted Standard users do not have the privileges to make changes in the Linux machine.
  • All actions in sudo group are recorded or logged so if a user makes a mistake it can be rectified.
  • Standard users can use execute certain roots commands being a part of sudo group, which other than that standard users have unprivileged access.
  • We do not have to know the root password for security reasons.

Ques2. What is the purpose of the sudo(8) command? What advantages it has over the su(1) command?  

    Sudo allows a user to execute command to run as super-user without being a logged in as super user.

    The advantages sudo command has over su command are:

  • All the commands executed as su are executed as super-user which may be dangerous sometimes but when we invoke sudo only that command will run as super-user and it requires user interaction to enter password for that user.
  • Su forces you to share root password whereas sudo allows you to execute without root password.
  • It can be used to apply security policies for the user logging in as another user.
  • Execute a list of commands specified by the sudo –l command only.

Ques3. What are the network settings for the Linux router and the Windows server?

Linux

route

[pic 1]

The above examples show the Kernel IP routing table. In this table the IP address of the system from which the “route” command was executed is 192.168.254.15. If the destination IP is within the range of 192.168.254.1 – 192.168.254.255 the default gateway would be *, which is 0.0.0.0. In this case the packet would be sent to the MAC address of the destination which would be found by an ARP request if not in the MAC address table.


ifconfig

[pic 2]

ifconfig was used to check the network configuration in Linux.

...

...

Download as:   txt (2.9 Kb)   pdf (440.5 Kb)   docx (376.8 Kb)  
Continue for 1 more page »
Only available on ReviewEssays.com