100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Summary

Summary CSIS 325 – System Administration and Security Complete Study Guide + Practice MCQs (2025 Edition)

Rating
-
Sold
-
Pages
54
Uploaded on
14-06-2025
Written in
2024/2025

This study guide covers everything you need for CSIS 325 – System Administration and Security at Liberty University, including both Windows and Linux administration, user and group management, authentication systems, network services, OS hardening, and backup strategies. Designed specifically for Liberty students, this 2025 edition features: Concise notes for each lecture topic Step-by-step command explanations Windows Server & Linux examples Security practices and policy configuration 30+ Multiple Choice & Concept Questions Whether you're preparing for exams or need a system admin cheat sheet — this guide will help you save time, reduce stress, and boost your grades.

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
June 14, 2025
Number of pages
54
Written in
2024/2025
Type
Summary

Content preview

CSIS 325 – System Administration and
Security (2025 Edition)


📘 TABLE OF CONTENTS:
1. Introduction to System Administration
o What is System Administration?
o Roles and Responsibilities
o Types of Operating Systems
2. Linux Administration Basics
o Linux Directory Structure
o File Permissions & Ownership (chmod, chown)
o User & Group Management (useradd, passwd, groupadd)
At


o Package Management (APT/YUM)
o Cron Jobs and Automation
ee


3. Windows Server Administration
o Active Directory Overview
qa


o Group Policy Management
o User/Computer Account Management
o Services and Task Scheduler
Kh


o File Sharing and NTFS Permissions
4. Authentication and Access Control
o Role-Based Access Control (RBAC)
ad



o LDAP & Kerberos
o Multi-Factor Authentication (MFA)
am


o Account Lockout Policies
5. Network Services & Configuration
o DNS, DHCP, FTP, and HTTP Services
o Configuring IP and Host Files
o Static vs Dynamic IPs
6. System Security Concepts
o Firewalls (UFW/Windows Firewall)
o Antivirus & Anti-Malware
o Patch Management
o Event Logging and Monitoring
7. Hardening Operating Systems
o Disable Unused Services
o Secure Boot and BIOS Settings
o File Integrity Monitoring
o Least Privilege Principle

, 8. Backup and Recovery
o Backup Strategies (Full, Incremental, Differential)
o Windows Backup Tools
o Linux Backup with rsync, tar, and cron
o Disaster Recovery Planning
9. Command-Line Essentials
o Linux Command Cheatsheet
o Windows PowerShell Essentials
o Common Admin Scripts
10. Practice Questions & MCQs
o 30+ Multiple Choice Questions
o Command-Based Questions
o True/False Concept Check
At



1. Introduction to System Administration
ee



What is System Administration?
qa



System Administration is the practice of managing and maintaining computer systems,
networks, and servers to ensure they operate efficiently, securely, and reliably. System
Kh



administrators are responsible for the day-to-day operations of IT infrastructure.
ad


Roles and Responsibilities
am


Key Responsibilities:

 User Management: Creating, modifying, and deleting user accounts
 Security Management: Implementing security policies and monitoring threats
 System Monitoring: Tracking system performance and resource usage
 Backup and Recovery: Ensuring data protection and disaster recovery
 Software Installation: Managing applications and system updates
 Network Administration: Configuring and maintaining network services
 Documentation: Maintaining system documentation and procedures

Daily Tasks:

 Monitor system performance and logs
 Respond to user support requests
 Apply security patches and updates
 Manage user accounts and permissions
 Perform system backups
 Troubleshoot hardware and software issues

Types of Operating Systems

,1. Windows Server

 Characteristics: GUI-based, Active Directory integration, proprietary
 Use Cases: Enterprise environments, Microsoft-centric organizations
 Versions: Windows Server 2019, 2022

2. Linux/Unix

 Characteristics: Command-line focused, open-source, highly customizable
 Popular Distributions: Ubuntu Server, CentOS, Red Hat Enterprise Linux
 Use Cases: Web servers, databases, cloud infrastructure

3. macOS Server

 Characteristics: Apple ecosystem integration, limited enterprise use
 Use Cases: Creative industries, small Apple-focused environments



2. Linux Administration Basics
At



Linux Directory Structure
ee



Root Directory Structure:
qa



/ (root)
Kh


├── /bin # Essential user binaries
├── /boot # Boot loader files
ad


├── /dev # Device files
├── /etc # Configuration files
am


├── /home # User home directories
├── /lib # Shared libraries
├── /media # Removable media mount points
├── /mnt # Temporary mount points
├── /opt # Optional software packages
├── /proc # Process information
├── /root # Root user home directory
├── /sbin # System binaries
├── /tmp # Temporary files
├── /usr # User programs and data
└── /var # Variable data (logs, mail, etc.)

Important Directories:

 /etc: System configuration files
 /var/log: System log files
 /home: User home directories

,  /usr/bin: User executable programs
 /proc: Virtual filesystem with system information

File Permissions & Ownership

Permission Types:

 r (read): Permission to read file contents (4)
 w (write): Permission to modify file contents (2)
 x (execute): Permission to execute file or access directory (1)

Permission Groups:

 Owner: The user who owns the file
 Group: Users in the file's group
 Other: All other users

Reading Permissions:
At


bash
ls -l filename
ee



-rwxr-xr-- 1 user group 1024 Jan 15 10:30 filename
qa


||| |||
||| ||└── Other permissions (r--)
||| |└─── Group permissions (r-x)
Kh



||| └──── Owner permissions (rwx)
||└──────── Number of hard links
ad



|└───────── File type (- = regular file, d = directory)
am


└────────── File permissions

chmod Command:

bash
# Numeric method (octal)
chmod 755 filename # rwxr-xr-x
chmod 644 filename # rw-r--r--
chmod 600 filename # rw-------


# Symbolic method
chmod u+x filename # Add execute for owner
chmod g-w filename # Remove write for group
chmod o=r filename # Set other to read only
chmod a+r filename # Add read for all (a=all)

chown Command:
$9.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ayat2

Get to know the seller

Seller avatar
ayat2 Virtual university
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
8 months
Number of followers
0
Documents
15
Last sold
4 months ago
High-Quality Study Materials for IT & Computer Science Courses

Welcome to my Stuvia profile! I’m an undergraduate student pursuing a Bachelor\'s degree in Information Technology (BSIT), passionate about creating high-quality, exam-ready study materials.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions