Questions for cyber secuirty . Please answer throughly and explain in detail.
1. What different ways can the swap space be configured? Why would you recommend one over the other?
2. During the install, X-Window and a desktop manager were not installed. In a production environment it is recommended NOT to run the X-Window environment. Explain the purpose of this recommendation.
3. How is the passwd file used, and what fields make up its content? Explain.
4. What are the advantages of having users execute privileged commands using sudo over su?
5. How could you automate a CentOS or Red Hat install geared for security?
6. Explain the significance of creating separate partitions of the /var and /boot directories. What is contained within these directories?