問題一覧
1
The configuration and management of the hardware, software and operating systems also known as our infrastructure used to support users and devices and the applications they rely on to do their job.
SYSTEMS ADMINSTRATION
2
is exposed to everything and everyone. Hardware, software, users and devices. Plus, every team in the organization relies on the SysAd to ensure that the infrastructure is operating normally day in and day out.is exposed to everything and everyone. Hardware, software, users and devices. Plus, every team in the organization relies on the SysAd to ensure that the infrastructure is operating normally day in and day out.is exposed to everything and everyone. Hardware, software, users and devices. Plus, every team in the organization relies on the SysAd to ensure that the infrastructure is operating normally day in and day out.
SYSTEM ADMINISTRATOR
3
These guys and gals are responsible for the organization’s network infrastructure which consists of routers and switches and the traffic flowing through them.
NETWORK ADMINISTRATOR
4
These folks are responsible for maintaining web servers. Web server is a fancy term for a server, a machine in our data center that hosts websites and web services. They are also responsible for exposing those websites and web services externally to the internet as well as to our internal users.These folks are responsible for maintaining web servers. Web server is a fancy term for a server, a machine in our data center that hosts websites and web services. They are also responsible for exposing those websites and web services externally to the internet as well as to our internal users.
WEB ADMINISTRATOR
5
These folks are responsible for securing the organization’s systems and networks. They are also responsible for firewalls. Both hardware firewall living in the inside and outside the network, as well as software firewalls living on the machines. You may think of them as traffic police. Or mall police. Only instead of sitting in malls, they sit on the organization’s networkThese folks are responsible for securing the organization’s systems and networks. They are also responsible for firewalls. Both hardware firewall living in the inside and outside the network, as well as software firewalls living on the machines. You may think of them as traffic police. Or mall police. Only instead of sitting in malls, they sit on the organization’s network
SECURITY ADMINISTRATOR
6
They are the ones responsible for the organization’s database servers. And the database is living on those servers. Databases are used by applications to read and write data. So these folks are responsible for ensuring efficiency and integrity of that data.They are the ones responsible for the organization’s database servers. And the database is living on those servers. Databases are used by applications to read and write data. So these folks are responsible for ensuring efficiency and integrity of that data.
DATABASE ADMINISTRATOR
7
These people are special. And here’s why. All previously discussed roles and other roles not mentioned such as developers, standard users and power users, they all need to go through the system administrator usually to request permissions via their user accounts to perform their configuration and everyday duties. And just to access the system in general.
SYSTEM ADMINISTRATOR
8
consists of a single exam and covers configuration, management and troubleshoot of wired and wireless network devices.
CompTIA Network+
9
covers server architecture, storage, networking and troubleshooting plus disaster recovery.
CompTIA Server+
10
Covers common task in all the major distributions of Linux.
CompTIA Linux+
11
. If you pass ANY Microsoft Exam, you’re an MCP.
MICROSOFT CERTIFIED PROFESSIONAL
12
Exams that are vendor specific version of CompTIA+ and CompTIA Network+. They are foundation for whatever role or field in IT you want to get in to.
MICROSOFT TECHNOLOGY ASSOCIATE
13
By far the most popular, most desired certification by employers. These are role-based certifications. There is an MCSA for productivity/office. There is an MCSA for Mobility, for Cloud, for infrastructure. And on the Systems Administrations side. It Actually consists of three (3) exams. One for compute, one for networking, and one for Active Directory.
MICROSOFT CERTIFIED SOLUTIONS ASSOCIATE
14
– You just need to pass a single exam from a list of exams within a role. Those list of exams are known as electives and are usually very specific, focusing on a single technology. You pass one of those, you become an MCSE (for a year). You’d be given a fancy Microsoft Badge.
MICROSOFT CERTIFIED SOLUTIONS EXPERT
15
This has nothing to do with Systems Administration as this targets developers building mobile, web and desktop applications.
MICROSOFT CERTIFIED SOLUTIONS DEVELOPER
16
Consist of a single exam that covers awareness and knowledge of all the major Linux distribution like Debian, Ubuntu, Suse, CentOS, RedHat. And also a little bit about finding your way around the Linux System through basic command line operations.
LINUX ESSENTIALS
17
This is basic Administration focused on installation and configuration of hardware and the Linux operating system. Packages and package management and a little bit deeper in the command line operations. And some scripting. This consists of 2 exams.
LPIC-1 CERTIFIED ADMINISTRATOR
18
This covers the advance side of Systems Administration. This covers networking services like DNS, DHCP, SSE, Web Servers, File Servers etc. This consist of two (2) exams.
LPIC-2 CERTIFIED ENGINEER
19
This is vendor specific (RedHat) certification exam for Linux
REDHAT CERTIFIED SYSTEM ADMINISTRATOR
20
There are many types of servers in a data center. Rack servers, Tower servers, Blade servers. All these different types of enclosures that houses a server that provides, power, cooling, and a much more efficient usage of space.
SERVERS
21
to provide network services to its users, to software and applications and to other servers within its environment.
SERVER
22
The most popular type of server that you’ll find in every environment and oftentimes multiples in every environment is the blank This type of server is used to store content for everybody. Users store their files.
FILE SERVER
23
Which is used to exposed websites externally to the Internet and internally to the organization’s users on the intranet (internal or company network).
WEB SERVER
24
Which is primarily used by websites and applications to read and write data into a structured database. This is different from a file server which stores unstructured data.
DATABASE SERVER
25
are used to host the middle-tier components of an application. So the front-end of your application which is a website or the application running on the desktop.
APPLICATION SERVER
26
are used to expose printers to the network so everyone can use them. And it also gives the ability to centrally manage the printers, the drivers associated with them and the print jobs that are running on them.
PRINT SERVER
27
are used to store process and deliver emails.
MAIL SERVER
28
are used to cut down the amount of hardware in the data center. One Server can host many servers and operating systems
VIRTUALIZATION SERVER
29
Another very important piece of hardware that Systems Administrator is responsible for are
STORAGE DEVICE
30
have been around forever since the 1950s so they are ancient technology. Sixty plus years and still, widely used today. They are also referred to as magnetic or mechanical disk. And that is because they used magnetism to store data on a rotating platter. They are big and slow compared to SSDs. But their major advantage is that they can store large amount of data cheaply.
HARD DISK DRIVES
31
Use flash storage that contains no moving parts whatsoever as data is stored on a microchip in the drive.
SOLID STATE DRIVES
32
Is a low-cost, low maintenance solution, where a storage subsystem is either a part of or, directly attached to, the servers. This could be anything from a stack of HDDs and SSDs inside of the machine or in its own enclosure externally connected to the machine. It is great for small businesses that do not have the I.T. staff or the budget to handle the more complex storage solutions.
DIRECT-ATTACHED STORAGE
33
When the storage sub-system moves to the network itself and connected directly to the network switch.
NAS
34
NAS
NETWORK-ATTACHED STORAGE
35
SAN
STORAGE AREA NETWORK
36
gives us the best of both worlds. The performance of a DAS with the scalability of a NAS. In this architecture, the storage devices are still directly connected to a switch. But they are connected to a special high-speed switch known as a fiber channel switch. And that gives them their own high speed network known as a
SAN
37
is a storage architecture that separates storage software from its hardware. Unlike traditional network-attached storage (NAS) or storage area network (SAN) systems, SDS is generally designed to perform on any industry-standard or x86 system, removing the software’s dependence on proprietary hardware. For example Microsoft has Storage Spaces (desktop) and Storage Spaces Direct (enterprise and data center) which is built into every version of Windows
STORAGE DEFINED STORAGE
38
allows us to create a huge pool from our physical disks.
STORAGE SPACES
39
There is a good amount of _____ between the Systems Administrator’s role and the Network Administrator’s role.
CROSSOVER
40
is a traffic related networking device that allow us to extend the reach of our local network to support mobile devices.
ACCESS POINT
41
monitor incoming and outgoing traffic. We configure security rules on these firewalls to allow or block specific kinds of traffic. In home networks, the firewall is usually built into the router.
FIREWALLS
42
Its job is to provide automatic assignment of IP addresses and allows a System Administrator to centrally administer of IP addresses across all the devices on our network.Its job is to provide automatic assignment of IP addresses and allows a System Administrator to centrally administer of IP addresses across all the devices on our network.
DHCP
43
is responsible for translating IP addresses to host names and host names into IP addresses.
DNS
44
is a command line (or terminal) utility to test connectivity between machines on the local network and even out to the internet.
PING
45
A ___ is what facilitates communication between a local network. All of our devices are connected to a switch and all that traffic goes through the switch to get to its destination from its source.
SWITCH
46
are a lot like switches and they connect multiple networks together and have the ability to forward traffic outside of the local network.
ROUTERS
47
are malicious actions or activities that target computer systems, networks, and data, with the intent to compromise their integrity, availability, or confidentiality.
COMPUTER THREATS
48
a broad category of malicious software designed to harm, disrupt, or gain unauthorized access to computer systems. Common forms of malware include viruses, worms, Trojans, spyware, and ransomware.
MALWARE
49
are programs that attach themselves to legitimate files and replicate when those files are executed. They can spread from one computer to another through infected files or email attachments.
VIRUSES
50
are self-replicating programs that can spread across networks and systems without any user intervention. They can consume network bandwidth and degrade system performance.
WORMS
51
appear to be legitimate software but contain malicious code. They can create backdoors for hackers, steal sensitive data, or carry out other harmful actions.
TROJANS
52
encrypts a user's files or entire system, making them inaccessible. Attackers demand a ransom from the victim to provide the decryption key.
RANSOMWARE
53
is designed to secretly collect information about a user's activities, such as browsing habits, keystrokes, and login credentials. This information is then sent to third parties without the user's consent.
SPYWARE
54
displays unwanted advertisements to users and often comes bundled with legitimate software. While not as malicious as other threats, it can be annoying and impact system performance.
ADWARE
55
attacks involve tricking users into revealing sensitive information like passwords, credit card numbers, or personal data by posing as a trustworthy entity via email, websites, or other means.
PHISHING
56
attacks manipulate individuals into revealing confidential information or performing actions that compromise security. These attacks often exploit human psychology rather than technical vulnerabilities.
SOCIAL ENGINEERING
57
attacks overload a system or network to make it unavailable to users.
DoS
58
attacks involve multiple compromised systems attacking a target simultaneously to overwhelm it.
DDoS
59
These are attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or have not been patched.
ZERO-DAY EXPLOITS
60
occur when individuals within an organization misuse their access to compromise systems, steal data, or engage in other malicious activities.
INSIDER THREATS
61
are networks of compromised computers, known as "bots" or "zombies," controlled by a central entity. They are often used for activities such as spam distribution, DDoS attacks, or cryptocurrency mining.
BOTNETS
62
are stealthy forms of malware that gain unauthorized access to a system and modify its operating system to hide their presence. They are difficult to detect and remove.
ROOTKITS
63
These attacks occur when a user unintentionally downloads malicious software while visiting a compromised website or clicking on a deceptive link.
DRIVE-BY DOWNLOADS
64
record a user's keystrokes on their keyboard, capturing sensitive data like passwords and credit card numbers. Cybercriminals can then use this information for fraudulent purposes.
KEYLOGGERS
65
are hidden entry points into a system, allowing unauthorized access. They are often created by malware or malicious actors to maintain access to a compromised system.
BACKDOORS
66
operates in memory and doesn't rely on traditional files or executables. This makes it harder to detect using traditional antivirus methods.
FILELESS MALWARE
67
can change its code or appearance each time it infects a new system, making it difficult for antivirus programs to identify and remove.
POLYMORPHIC MALWARE
68
involves writing scripts in the batch file format to automate tasks in Windows operating systems
BATCH SCRIPTING
69
Adds a comment.
REM
70
Turns off command echoing, useful for cleaner
@echo off
71
Displays messages or turns on/off command echoing.
ECHO
72
Pauses the script and displays "Press any key to continue...".
pause
73
Prompts for confirmation before deleting each file.
/P
74
Force deletes read-only files.
/F
75
Deletes specified files from all subdirectories.
/S
76
Quiet mode, does not ask for confirmation.
/Q
77
Selects files to delete based on attributes.
/A