Introductory Flashcards
sysadministration:
configure servers, monitor networks, provision. Tech generalist. Keep an organization up and running. Diverse set of tech skills.
The field in IT responsible for maintaining reliable computer systems in a multi-user environment.
sys admin manages what areas?
software, hardware, services necessary for operations. email, file storage. services, servers, software,
server
software or a machine that provides services to other software or machines.
forms of server hardware:
towers, rack servers, blade servers.
file server wants:
storage for more files.
how to connect to servers remotely:
ssh, KVM switch, hub.
KVM switch
Keyboard, mouse, monitor to connect to multiple servers. (Keyboard, video, mouse) to control different computers connected to it.
cloud:
virtual storage. server storage. networking service with data centers with hundreds of thousands of servers.
where is the cloud?
datacenters.
drawbacks of using the cloud:
costs can add up over time especially for long terms significant storage, you are dependent on the service provider for infrastructure and service availability, susceptible to downtime, security risks.
who decides which policies to use?
sys admin, usually.
should users be allowed to install software?
probly not. could get malicious software.
how to advise users on complex passwords and their requirements?
enforce complex passwords with a mix of symbols, numbers, letters, over 8 char.
should users be allowed to use personal websites like facebook?
personal call. Some companies do hate or like it, depending. I think that there are opportunities to promote the business from social media platforms that we can consider, and that there are times when it is definitely profitable for employees to do that, but when it comes to a reduction in productivity, it can also be necessary to restrict those activities if they are interrupting workflow.
vital to set a device password on company phones. The employees should have the company data on their phones and devices protected, or else bad actors could take advantage of their decisions.
password protection against if devices are lost or stolen.
Documentation
all established IT policies should be documented and easily accessible to employees, whether on the company intranet, shared drive, other platforms. Promotes understanding and adherence. Wiki, etc.
services that need managed:
file storage, email, provide network access, ensure secure connections, initial setup, updates, security patches, compatibility checks with the computer systems.
managing users and hardware:
make and remove users and accounts and machines.
standardized machines.
h
hardware lifecycle:
when built? how used? what happens to this if someone needs a new one? new or used? who maintained? how many users have used it?
procurement:
where hardware is bought
deployment:
hardware is set up for employee
maintenance:
software updated and fixed up if issues occur
retirement:
hardware is unusable, no longer needed, removed.
one way to manage provisioning:
stickers, tracking numbers.