Create and implement backup policy for desktop machine

Assignment Help Operating System
Reference no: EM13908705

Question 1:

An important service provided by any system is the ability to run a process on a predetermined schedule without human intertention. The "automation" of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux currently offers not one service but potentially three-cron, anacron, and systemd timer units.

In about a page compare and contrast all three systems. Illustrate your discussion by using the system files /etc/anacron and /etc/crontab and by constructing equivalent systemd service and timer files.

Notes:

a. It says "compare" and "contrast"-so explain how they are the same and how they are different.
b. Your answers must be written in your own words.
c. Please use the specified system files to explain how scheduling is defined do not invent your own.
d. Any technical term used must be explained.
e. Do not discuss the package systemd-cron. Write and test the systemd service and timer files yourself.
f. One way to test a crontab file or a anacrontab file, or sys- temd service and timer files is to use the date command as the command ultimately to be run the output from the command ef- fectively timestamps when it was run by your scheduler.
g. Some sources of information: Cron:
• The text book
• man 5 crontab
Anacron:
• The text book
• man 5 anacrontab
Systemd timer unit:
• https://wiki.archlinux.org/index.php/Systemd/ Timers
• https://www.certdepot.net/rhel7-use-systemd-timers/
h. List all resources used in answering the question.

Question 2:

The web administrator of your organisation needs to login remotely to the machine that is running the organisation's public web site.

You tell her that the only way to login is via The Secure Shell-which she knows nothing about! Assuming she is logging in via a Linux box write a help document for her containing the following-

a. A short introduction to SSH, explaining why it is the preferred way of logging into a remote machine-this explanation will need to discuss symmetric and asymmetric key encryption.

b. A discussion of the contents of the file
~/.ssh/known_hosts.

Your discussion should include (but not be limitted to):
• how the file is populated,
• how the keys in the file are used by SSH,
• a discussion of "man-in-the-middle" attacks,
• why the hostnames in the file are "hashed", and
• how individual keys can be deleted by ssh-keygen.

c. A description how to configure access so that no pass- words are needed-that is by using user asymmetric keys. This will require a discussion (with examples) of the command ssh- keygen, the file ~/.ssh/authorized_keys, passphrase pro- tected keys and the commands ssh-agent and ssh-add.

Notes:

a. Any technical term used must be explained.

b. Your virtual Debian has the SSH dæmon installed and running by default-so you can SSH to it from the host system or from a second virtual machine.

c. Your virtual machine has two network interfaces configured-a host only interface and a NAT interface. To bring the host only network "up" study the man pages interfaces(5), ifup(8) and ifdown(8).

d. You must show the relevant changes/parts of any files discussed.

e. This is a help document so you must explain (in your own words) the purpose of every file and command mentioned (plus any com- mand line options).

f. Be very clear which key (public or private) is stored on which machine (remote or local)

g. Port forwarding, SSH tunnels and firewalls need not be discussed- they will be covered later in the course.

Question 3:

a. In about a page explain in your own words what a Logical Volume Manager is, its purpose and why it is useful.
b. Illustrate your explanation by using the Linux Log- ical Volume Manager to combine the two spare disks available on the Virtual Debian distribution. Combine the two disks into one logical volume. Format the new logical disk and modify the /etc/fstab file to mount the new disk at boot.
c. Document and explain in your own words the purpose of every command you use (plus any command line options) and any configuration files or scripts you modify or create.

Notes:

a. Be certain to explain the meaning of any tehnical terms you may use-for example, what is a "physical volume", a "volume group", &c.
b. Make use of the utilities pvdisplay, vgdisplay, &c. to show the results of commands and that they have worked.

Question 4:

A user comes to you requesting that you create and implement a backup policy for his desktop machine. What he wants, is to be able to place a blank DVD in his Single-Sided DVD-burner at the end of the working day on a Friday and have all the files he has been working on for the week backed up automatically that evening to the DVD!

After a bit more questioning you find out that:
• He frequently creates/deletes and changes files on a daily basis.
• He wants to be able to recover files for any given day.
• He only wants his home directory backed up.
• His home directory contains about 2Gbytes of data.
• His desktop machine has a spare disk (mounted as /spare) that has plenty of free space for temporary storage.

Tasks that need to be done:
a. Using the information above design a backup policy. Give a detailed description and justification of your backup-policy.
b. Using tar, a shell script or scripts and systemd timer and service files to implement your backup policy.

Notes:

a. Explain in your own words each operation you needed to perform to implement your backup policy. Your descriptions of each oper- ation need to show you understand the purpose of the operation.

b. Use /spare as a temporary storage for backup files until they are burnt to the DVD on Friday.

c. "Temporary Storage" means just that-cleanup /spare after a successful burn.

d. A Single-sided DVD can only hold 4.2GiB (4.2×1024×1024×1024 bytes) of data.

e. The ISO9660 file-system-is the file-system used on Optical disks.

f. To write data to an optical disk a complete ISO9660 disk image file containing the data, must be created on the local hard disk and then burnt to the optical disk.

g. You will need utilities for creating ISO9660 images and burning DVDs, have a look at the following packages dvd+rw-tools, genisoimage, wodim.

h. List all resources used in answering the question.

Reference no: EM13908705

Questions Cloud

Series of different lengths : Before you enter the series, you are to have the program ask the user how many marks there are. After the last mark is entered, show the average of the inputted marks, rounded to 1 decimal point. Test your program to ensure that it works for serie..
How can we measure our nation''s economic performance? : How can we measure our nation's economic performance?
What is the standard deviation of return of a us : What is the standard deviation of return from the point of view of a U.S. and a Japanese investor? What is the correlation of return between markets from the point of view of each investor?
Master budget included the following fixed budget report : Phoenix Company's 2013 master budget included the following fixed budget report. It is based on an expected production and sales volume of 15,000 units.
Create and implement backup policy for desktop machine : An important service provided by any system is the ability to run a pro- cess on a predetermined schedule without human intertention. The "automation" of tasks can reduce the workload of the system administrator significantly.
How large is the us trade deficit relative to gdp : How large is the US trade deficit relative to GDP
How many people in total will you need to recruit : You are in charge of a new study on the effect of caffeine and memory. From , a previous pilot study , you find that the effect size is 0.6. You want to have a type I error at 0.05 and a type II error of 0.2 . In your study you split your sample i..
Phoenix company''s actual income statement : Refer to the information in Problem 23-3A. Phoenix Company's actual income statement for 2013 follows.
Why you have drawn your indifference curves as you have them : Draw in your indifference map (set of indifference curves). Explain why you have drawn your indifference curves as you have drawn them.

Reviews

Write a Review

Operating System Questions & Answers

  Race condition

Race Condition:  A situation in which multiple threads or processes read and write a shared data item and the final result depends on the relative timing of their execution.

  Deadlock to occur in multiprogramming environment

List the reasons which causes deadlock to occur in multiprogramming environment and discuss how can the deadlock detection algorithm for one resource find out if a deadlock exists in the above sequence

  Virtual machines

Virtual machines supported by a host operating system

  Effects of spyware and adware

Describe the effects of spyware and adware. Discuss how has spyware and adware impacted the public's confidence in the security of internet?

  Create a server process that acts as a memory manager

Create a server process that acts as a Memory Manager that allocates valid memory requests to frames for multiple clients as in Program

  Compare threads and processe

Compare threads and processes based on the amounts of system resources each uses and based on a common file each uses. How does this answer affect the efficiency of context switching for each?

  Describe a client or server protocol used in everyday life

Suppose a time-sharing operating system allocated time slices of 20 milliseconds and the machine executed an average of 5000 instructions per microsecond. How many instructions could be executed in a single time slice?

  Steps add to the check list

According to your personal experience, what steps would you add to the check list and determine what steps would you leave out?

  Identify an operating system and application combination

Identify an operating system and application combination, and discuss at least 2 cluster implementation models supported. Identify and discuss the advantages and disadvantages of the implementation of the models you suggested

  Mobile ip is emerging

Mobile IP is emerging as the next industry standard for the way in which wireless devices move from one network to another.

  Discuss the purpose of operating systems

Discuss the purpose of operating systems and Describe the components that comprise operating systems and the functions of each of these components

  Question 1a enumerate the objectives of a procurement

question 1a enumerate the objectives of a procurement development modelb describe one procurement development model you

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd