[Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE Module 1. Introduction to Systems Administration and Maintenance Intended Learning Outcome After reading this chapter, you should be able to: 1. 2. 3. 4. Explore the world of the system administrator Learn and describe the cloud computing and IT infrastructure services List the duties and skill set required of the system administrator List a few personalities of a typical system administrator What is a System Administrator? system administrator, n.: one who, as a primary job function, manages computer and network systems on behalf of another, such as an employer or client. What exactly does a System Administrator do? What does a System Administrator do? It seems that most people agree that this job has to do with computers in some capacity, but that really is already where the definitions start to become fuzzy: System Administrators are in charge of “servers” as well as of personal computers, desktop machines, laptops and, increasingly, mobile devices. With the evolution of computing coming full circle, we find that the migration from the mainframe computer to the personal and independent computing device to the networked server back to the central Infrastructure as a 1|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE Service model inherent in today’s Cloud Computing concepts places the System Administrator in the middle of it all. So perhaps the main focus of a System Administrator’s job is then really the central connection between the independent systems, the network itself? Hmmm, System Administrators surely are involved in the deployment and installation of the computers in a datacenter (or is that the task of specific Datacenter Technicians?) and connecting all the different components certainly involves a lot of cables. But then, don’t we have Network Administrators, or is that a more specialized subcategory of System Administrators? System Administrators seem to spend as much time typing cryptic com mands into dark terminal windows as they do running cables and labelling hardware, and while they may no longer shuffle punch cards, they frequently do write programs to help them complete their tasks. System Administrators are known to get woken up in the middle of the night when things go “bump”, and as a result they are also known to have a fondness for caffeinated drinks. They are able to kickstart a generator, assess the required cooling power for their server room, use duct tape in creative and unexpected ways, assemble servers out of mysterious looking parts, and may end up handling a circular saw or other heavy machinery when their Leatherman multi-tool cannot complete the task. System Administrators plan, budget and design networks and backup or storage systems, add and delete users (well, user accounts, anyway1), install and update software packages, draft policy documents, fight spam with one hand while rebuilding a corrupted revision control system with the other. They have access to all systems in the organization, may undergo retina- and fingerprint scanners to access “Mission Impossible”-style protected datacenters and spend countless hours in front of a multitude of computer screens, typing away on oddly shaped keyboards consuming not entirely healthy amounts of coffee and energy drinks. Well... in some places, a System Administrator might do all of this. In others, there might be different, more specialized people for the various tasks: there might be datacenter technicians and “SiteOps”, Network Administrators, System Programmers, System Architects, Operators, Service Engineers, Storage Engineers, Site Reliability Engineers, Virtual Operations, Infrastructure Architects... the number of different job titles for things that might otherwise fall into the more general “SysAdmin” category seems endless. The various areas of expertise included in the day-to-day routine such as system design, infrastructure architecture, system fault diagnosis, hardware benchmarking, and others eventually require experience in a number of related fields; a lot of them involve more than just a little bit of programming experience and in some cases complex infrastructure tools based on solid software engineering practices need to be built. This illustrates that just as it is hard to clearly define where System Administration begins, we often can’t quite put our finger on where it ends and another discipline becomes the primary job function. Even if job descriptions and duties differ significantly, there are a lot of people who simply identify as System Administrator regardless of job title. We all have something in common: we manage and maintain computer and network systems. Systems administrators design, install, and support an organization’s computer systems. They are responsible for LANs, WANs, network segments, and Internet and intranet systems. They work in a variety of 2|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE environments, including large corporations, small businesses, and government organizations. They install and maintain network hardware and software, analyze problems, and monitor networks to ensure their availability to users. These workers gather data to evaluate a system’s performance, identify user needs, and determine system and network requirements. What is a Server? Basically, a sysadmin is responsible for their company's I.T. services. Employees need these I.T. services so that they can be productive. This includes things like email, file storage, running a website and more. The services have to be stored somewhere, they don't just appear out of nowhere. Any thoughts on where they're stored? If you answered servers, you're correct. The term servers can have multiple meanings. The servers have web content that they serve to other computers. Also, servers can be software that perform a certain function. In many cases sysadmins are responsible for maintaining all of the company's servers. If you're working as an I.T. support specialist and have systems administration responsibilities, these tasks could be something you'll perform. A server is essentially software or a machine that provides services to other software or machines. For example, a web server stores and serves content to clients through the Internet. You can access the web server through a domain name like google.com. Let's run down some other examples of servers. An email server, provides email service to other machines. And an SSH server provides SSH services to other machines and so on and so forth. We call them machines that use the services provided by a server, clients. Clients request the services from a server and in turn, the servers respond with the services. A server can provide services to multiple clients at once and the client can use multiple servers. Any computer can be a server. I can start up a web server on my own home computer that would be able to serve my own personal website on the internet for me. But, I don't really want to do that because I have to leave my computer on all the time in order for my website to be available all the time. Industry Standard Servers are typically running 24 seven and they don't run dinky little hardware like my home laptop. They run on a really powerful and reliable hardware. Server hardware can come in lots of different forms. They can be towers that sit upright, they look very similar to the desktops we've seen. Those towers can be put in a closet or can sit on the table if you want them to. But, what if 3|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE you needed to have 10 servers? The towers would start taking up way too much space. Instead, you can use rack servers which lay flat and are usually mounted in a 90 inch wide server rack. If you needed even more space, you could use blade servers that are even slimmer than racks. There are other types of form factors for servers but these are the most common ones. You can also customize the hardware on your servers depending on the services. For example, on a file server you'll want more storage resources so that you can store more files. What about connecting to our servers? Working in a small IT organization, you could potentially deal with a handful of servers. You don't want to have a monitor, keyboard and a mouse for each of these servers, do you? Fortunately, you don't have to thanks to something we learned in an earlier course. We can remotely connect to them with something like SSH. Even so, you should always have a monitor keyboard on hand. Sometimes when you're working your network might be having issues and SSH won't be an option. A common industry practice is to use something known as a KVM Switch. KVM stands for keyboard, video and mouse. A KVM Switch looks like a hub that you can connect multiple computers to and control them using one keyboard, mouse and monitor. You can read more about using KVMs in the next supplemental reading. Now though we've got a better understanding of servers and what they do, you can go out and start buying server hardware and setting up services for your organization. Or maybe not. You don't actually have to buy your own server hardware or even maintain your own services. In the next lesson, were going to learn about a wave of computing that started to overtake the IT world, cloud computing. You don't actually have to buy your own server hardware or even maintain your own services. What are Clouds? Oh, the Cloud, the magical wonderful Cloud that you hear about in the news that moves data across the white fluffy windows in the sky. The magical Cloud dispersed bits of data across the world in itty bitty raindrops, right? No, that's not how the Cloud works at all, but you'd be surprised how many people believed that. There's no doubt you've heard the term Cloud in the news or from other people. Your photos are stored in the Cloud, your email is stored in the Cloud. Cloud computing is the concept that you can access your data, use applications, store files, et cetera, from anywhere in the world as long as you have an internet connection. But the Cloud isn't a magical thing. It's just a network of servers that store and process our data. You might have heard the word data center before. A data 4|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE center is a facility that stores hundreds, if not thousands of servers. Companies with large amounts of data have to keep their information stored in places like data centers. Large companies like Google and Facebook usually own their own data centers because they have billions of users that need access to their data at all times. Smaller companies could do this, but usually rent out part of a data center for their needs. When you use the Cloud service, this data is typically stored in the data center or multiple data centers, anywhere that's large enough to hold the information of millions, maybe even billions of users. It's easy to see why the Cloud has become a popular way of computing in the last few years. Now instead of holding onto terabytes of storage space on your laptop, you can upload that data to a file storage service like Dropbox, which stores that data in a managed location like a data center. The same goes for your organization. Instead of managing your own servers, you can use internet services that handle everything for you including security updates, server hardware, routine software updates, and more. But with each of these options come a few drawbacks. The first is cost. When you buy a server, you pay upfront for the hardware. That way, you can set up your services like a file storage at potentially very little cost because you're the one managing it. When you use Internet services like Dropbox that offer file storage online, the starting cost may be smaller. But in the long term, costs could add up since you're paying a fixed amount every month. When comparing the cost of services, always keep in mind what a subscription could cost you for every user in your organization. Weigh that against maintaining your own hardware in the long term and then make a decision that works best for your organization. The second drawback is dependency. Your data is beholden to these platforms. If there's an issue with the service, someone other than you is responsible for getting it up and running again. That could cost your company precious loss of productivity and data. No matter what method you choose, remember that you're still responsible for the problems that arise when there's an issue. If Dropbox is having an issue with your important user data, it's still your problem and you have to get it working again no matter what. To prevent a situation like that from popping up, you might consider backing up some critical data in the Cloud and on a physical disk. That way, if one system goes down, you have another way to solve the problem. Whether you choose to maintain physical service or use Cloud services, these are the type of things you need to think about when providing services to your company. In the next couple of lessons, we're going to talk about some of the other responsibilities of the system admin. We'll give you a high-level overview of these, then dive even deeper later in this course. 5|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE Organizational Policies In a small company, it's usually a sys admin's responsibility to decide what computer policies to use. In larger companies with hundreds of employees or more, this responsibility usually falls under the chief security officer. But in smaller businesses or shops, as the IT lingo goes, the sys admin has to think carefully about computer security and whether or not to allow access to certain users. There are few common policy questions that come up in most IT settings that you should know. Should users be allowed to install software? Probably not. You could run the risk of having a user or accidentally install malicious software, which we'll learn about in the upcoming course in security. Should users have complex passwords with certain requirements? It's definitely a good rule of thumb to create a complex password that has symbols, random numbers, and letters. A good guideline for a password blend is to make sure it has a minimum of 8 characters that make it more difficult for someone to crack. Should you be able to view non-work-related websites like Facebook? That's a personal call. Some organizations prefer that their employees only use their work computer and network strictly for business, but many allow other uses, so their employee can promote their business or goods on social media platforms, stay up to date on current events, and so on. It will definitely be a policy that you and your organization's leaders can work out together. If you hand out a company phone to an employee, should you set a device password? Absolutely. People lose their mobile devices all the time. If a device is lost or stolen, it should be password protected, at the very least, so that someone else can't easily view company emails. We'll dive way deeper into the broader impact and implications of security and organizational policies in the security course that's last up in this program. These are just a few of the policy questions that can come up. Whenever policies are decided upon, have to be documented somewhere. It's supercritical to maintain good documentation. If you're managing systems, you'll be responsible for documenting your company's policies, routine procedures, and more. You can store this documentation on internal wiki site, file server, software, wherever. The takeaway here is that having documentation of policies already available to your employees will help them learn and maintain those policies. 6|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE IT Infrastructure Services We've talked a little bit about the services that are potentially used in an organization like file storage, email, web content, et cetera. But there are many other infrastructure services that you need to be aware of. If you are an IT support specialist doing system administration, you'd be responsible for the IT infrastructure services in your organization. Rome wasn't built in a day, you know, and neither are IT support specialists. So, how about getting network access? That's a service that needs to be managed. What about secure connection to websites and other computers? You guessed it, that's also a service that has to be managed. And managing services doesn't just mean setting them up. They have to be updated routinely, patched for security holes, and compatible with the computer within your organization. User. and Hardware Provisioning In other responsibilities sys admins have is managing users and hardware. Sys admins have to be able to create new users and give them access to their company's resources. On the flipside of that, they also have to remove users from an IT infrastructure if users leave the company. It's not just user accounts they have to worry about, sys admins are also responsible for user machines. They have to make sure a user is able to log in and that the computer has the necessary software that a user needs to be productive. Sys admins also have to ensure that the hardware they are provisioning or setting up for users is standardized in some way. You should be familiarize about imaging a machine with the same image because this practice is industry standard with dealing with multiple user environments. Not only do sys admins have to standardize settings on a machine, they have to figure out the hardware lifecycle of a machine. They often think of the hardware lifecycle of a machine in the literal way. When was it built? When was it first used? Did the organization buy it brand new or was it used? Who maintained it before? How many users have used it in the current organization? What happens to this machine if someone needs a new one? These are all good questions to ask when thinking about an organization's technology. 7|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE System administrators don't want to keep a ten year old computer in their organization. Or maybe they do. Even that's something they might have to make a decision on. There are four main stages of the hardware lifecycle. Procurement. This is the stage where hardware is purchased or re-used for any employee. Deployment. This is where hardware is set up so that the employee can do their job. Maintenance. This is the stage where software is updated and hardware issues are fixed if and when they occur. Retirement. In this final stage, hardware becomes unusable or no longer needed and it needs to be properly removed from the fleet. In a small position, a typical hardware lifecycle might go something like this. First, a new employee is hired by the company, human resources tell you to provision a computer for them and set up their user account. Next, you allocate a computer you have from your inventory or you order a new one if you need it. When you allocate the hard ware you may need to tag the machine with a sticker so they can keep track of which inventory belongs to the organization. Next, you image the computer with the base image for further using a streamlined method that we discussed in our last course, operating systems and you. Next, you name the computer with a standardized host name. This helps with managing machines. Installing software and configuring settings on a new computer can get a little time consuming. In a small company you don't do it often enough where it makes much of a difference, but in a larger company a time-consuming process just won't cut it. You'll have to learn automated ways to provision new machines so that you only spend minutes on this and not hours. Routine maintenance When you manage machines for a company, you don't just set it and forget it, you have to constantly provide updates and maintenance so that they run the latest secure software. When you have to do this for a fleet of machines, you don't want to immediately install updates as soon as they come in. That would be way too timeconsuming. Instead, to effectively update and manage hardware, you do something called batch update. This means that once every month or so, you update all your servers with the latest security patches. You have to find time to take their services offline, perform 8|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE the update, and verify that the new update works with the service. You also don't have to perform an update every single time a new software becomes available. But it is a common practice to do batch updates for security updates and very critical system updates. And the security costs, we dive deeper into security practices, but a good guideline is to keep your system secure by installing the latest security patches routinely. Staying on top of your security is always a good idea. Vendors Not only do sys admins in a small company work with using computers, they also have to deal with printers and phones, too. Whether your employees have cellphones or desk phone, their phone lines have to be set up. Printers are still used in companies, which means they have to be set up so employees can use them. Sys admins might be responsible for making sure printers are working or if renting a commercial printer, they have to make sure that someone can be on site to fix it. What if a company's fax machine isn't working? If you don't know what a fax machine is, that's not totally surprising. They've been slowly dying since the invention of email. Fax machines are still alive and kicking at companies, and they're a big pain to deal with. Sys admins could be responsible for those, too. Video-audio conferencing machines, yep, they probably need to handle those, too. In an enterprise setting, sys admins have to procure this hardware one way or another. Working with vendors or other businesses to buy hardware is a common practice. Setting up business accounts with vendors like Hewlett Packard, Dell, Apple, etc., is usually beneficial since these companies can offer discounts to businesses. These are things that sys admins have to think about. It's typically not scalable just to go out and purchase devices on Amazon. Although if that's what's decided, they could do that too. Sys admins must be sure to weigh their option before purchasing anything. They need to think about hardware supply. So if a certain laptop model isn't used anymore, they need to think of a suitable backup that works with their organization. Price is also something to keep in mind. They'll probably need formal approval from their manager or another leader to establish this relationship with a vendor. It's not just technical implementations of hardware that sys admins have to consider. It's so many things. 9|P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE Troubleshooting and managing issues When you're managing an entire IT infrastructure, you'll constantly have to troubleshoot problems and find solutions for your IT needs. This will probably take up most of your time as an IT support specialist. This could involve a single client machine from an employee or server or service that isn't behaving normally. Some folks, who start their careers in IT support deepen their knowledge to become system administrators. They go from working on one machine to multiple machines. Sys admins also have to troubleshoot and prioritize issues at a larger scale. If a server that sys admin manage stop providing services to a thousand users and one person had an issue about the printer, which do you think would have to be worked on first. Whatever the scenario, there are two skills that are critical to arriving at a good solution for your users. The first is troubleshooting, asking questions, isolating the problem, following the cookie crumbs, and reading logs are the best ways to figure out the issue. You might have to read logs from multiple machines or even the entire network. The second super important skill that we covered is customer service; showing empathy, using the right tone of voice and dealing well with difficult situations. These skills are essential to all IT roles. In some companies, sysadmins have to be available around the clock. If a server or network goes down in the middle of the night, someone has to be available to get it working again. Don't worry, a sysadmin doesn't have to be awake and available 24/7. They can monitor their service and have it alert them in case of a problem. So how do you keep track of your troubleshooting? A common industry standard is to use some sort of ticketing or bug system. This is where users can request help on an issue and then you can track your troubleshooting work, through the ticketing system. This helps you organize and prioritize issues and document troubleshooting steps throughout this lesson, we'll introduce types of services that a sysadmin needs to maintain and what responsibilities they have in an organization. We'll also share some best practices for troubleshooting when it comes to systems administration. When you work as an IT support specialist, Systems administration can become part of your job. So, it helps to think about all aspects of managing an IT infrastructure in an organization. The more prepared you are the better. 10 | P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE Best practices for Effective IT troubleshooting System monitoring and troubleshooting can be a time-consuming and frustrating activity. It’s not unusual for IT folks to spend hours finding and fixing a problem that could have been resolved in 10 minutes had better troubleshooting tools and processes been in place. Improving IT troubleshooting and monitoring doesn’t need to be an expensive undertaking. Many times, it’s just a matter of implementing a few company-wide guidelines. Let’s look at six best practices that will make troubleshooting a less timeconsuming, more effective undertaking. 1. Collect enough information to replicate the issue If you can’t replicate an issue, you can’t fix it. Yet many help desk tickets come in with a description as vague as “I can’t login.” The result is an ongoing email exchange between the IT admin assigned to the ticket and the employee that reported the issue. This hunt for more information can go on for days. Those days cost money. The issue at hand is often systemic behavior. The remedy is to ensure that enough information to replicate the issue is provided in the initial ticket. Some IT teams enforce acceptable reporting behavior by providing a “fix ticket” form that has a field that requires a submitter to list the steps to reproduce the given issue. In addition, many IT teams have simple programs in place to educate all parties about how to write an effective ticket and to monitor behavior moving forward to determine that the new, desired behavior is being adopted. Should the behavior persist, more direct, personal intervention is given. Regardless of remedy, just about all effective IT teams set a baseline expectation that requires submitters to provide adequate replication descriptions from the onset. 2. Customize your logs for actionable insight Just as an incomplete help desk ticket prolongs time to resolution, logs that emit incomplete information also hinder troubleshooting efforts. Most logging frameworks provide options for customizing the format of log output. It’s important to make sure that all log formats provide a clear description of items and events being logged. In addition to date and time, the log entry should define the source emitting the entry (for example, MAC or IP address), along with a message field describing the intent of log entry. A data field that adheres to a structured format describing detailed information relevant to the 11 | P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE item or event being logged is also useful. Learn more about log analysis for system troubleshooting. 3. Create useful error output at the source-code level Consider the following error message sent to a log collector: 28 Nov 2017 15:49:08.871 err Bad number encountered What does the error message tell you? Nothing more than that a bad number was encountered. You have no idea what the bad number is, why it’s an error, or how to address the issue. To remediate this, somebody is going to have to spend a lot of time just to uncover the source of the problem, and that expenditure doesn’t yet account for the time needed to fix it. Now consider this error described in the log: "numValue": 3727 "source": "at _.times (/home/apps/seventips/library/noodler.js:25:42)", "message": "Bad number encountered. The submitted number, 9429 is an odd number. Odd numbers are not acceptable to the system. Please submit an even number", "level": "err" } There’s a big difference. The error message above contains enough information to allow the IT admin to make an intelligent guess about the cause and source of the problem, and to begin troubleshooting. A useful error message contains three pieces of information: a description of the error, the probable cause and, if possible, the most likely solution. Ensuring that useful error messages are logged is about changing the behavior of an IT organization. It’s up to management to establish a compliance policy and then provide the procedures and tools necessary to support that policy. Thus, IT Admins will do well to define the format for useful error messages and then have a set of senior developers find or build a library of code that allows developers to easily create error 12 | P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE messages that support the format. The adjustment should require a developer to add no more than a line or two of code to comply with policy. 4. Don't mistake symptoms for root cause Making an issue go away is not the same as finding the root cause and fixing it. The trick for effective troubleshooting is to identify and report in detail on the root cause so that the problem does not crop up again. If you’re under a time crunch and can only make the symptoms go away to meet a deadline, make sure you report that you have not identified the root cause and the fix is temporary. 5. Implement a comprehensive logging infrastructure and use correlation IDs Making a call from a web page to a backend server is only one aspect of an application’s behavior in a distributed environment. That one call to the backend might in turn send data onto a message broker, a database, or another web-based API. Thus, the operational data is going to show up in logs well beyond the web server. When it comes to time to resolution, you’ll need a way to follow the aggregation and transformation of data throughout a request’s journey to all points in the transaction. The easiest way to tie all calls together is to use and respect Correlation IDs. A Correlation ID is a unique identifier that gets passed with data between all points in a transaction. A Correlation ID allows the transaction to be traced in various logs. It’s a common technique generally supported by using the header attribute, X-Correlation-ID. 6. Use system monitors and predictive analytics These days, system monitors do a lot more than just collect data and store it. Modern system monitors have the intelligence to keep an eye on the system in which it is running. Also, a system monitor can aggregate all log information emanating from a machine into a single output. For example, InsightOps from Rapid7 will not only centralize all of your logging activity, it will also monitor CPU, memory, and disk usage on endpoints and send real-time alerts of known issues or critical events. System monitors are essential for doing advanced troubleshooting, particularly for issues related to machine state over time. Also, using a predictive analysis tool to monitor dangerous trends in system activity will help you address smaller problems before they turn critical. The most effective troubleshooting to do is no troubleshooting at all! Putting It All Together In today’s modern IT environment, troubleshooting is unavoidable. It’s an important part of the revision process intrinsic to the principle of continuous improvement. Using the six best practices described above will make your 13 | P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE troubleshooting efforts more effective and less costly. In fact, they might even make troubleshooting more enjoyable. And, as companies in the know understand, when work is enjoyable, quality is outstanding. Assessment Direction: Choose the letter that corresponds to your answer. Highlight your answer. Question1: Which of the following can be a responsibility of a systems administrator? a. b. c. d. Setting up new user accounts and machines Maintaining servers Troubleshooting user issues All of the above Question 2: Which of the following make up IT infrastructure? a. b. c. d. Hardware and software Network Operating systems All of the above Question 3: Which of these is considered a server? Select all that apply: a. b. c. d. A software that provides a service to other software Software that's only available to the computer it's installed on Software that provides a service to other machines A computer that provides a service to other computers Question 4: A KVM switch is used to: a. b. c. d. Mount multiple servers into one server rack. Allow you to serve web content to many clients. Enable you to receive incoming SSH connections. Switch between multiple computers using one monitor, keyboard, and mouse Question 5: Which of these server-hardware can you stack on top of each other in a server rack? a. Rack b. Tower c. Desktop 14 | P a g e [Pick the date] SYSTEMS ADMINISTRATION AND MAINTENANCE d. Blade Question 6: With _______, you can access your data, use applications, and more from anywhere in the world, as long as you have an Internet connection. a. a LAN b. a PAN c. cloud computing Question 7: What are the benefits of cloud computing over local computing? Select all that apply. a. b. c. d. There are smaller starting costs for cloud computing. There are potential long-term costs associated with cloud computing. Software updates are handled by the company providing the service. Services are accessible from anywhere in the world. Question 8: What are the benefits of local computing over cloud computing? Select all that apply. a. There are potential long-term costs associated with local computing. b. You have complete control of the IT infrastructure. c. Services are handled by another organization, so that makes your organization dependent on a third party. d. Updates can be handled at any time. Question 9: Which of the following is a good policy to enforce on passwords? Check all that apply. a. b. c. d. A long password length The use of common words A mixture of symbols and numbers A short password length Question 10: Which of these is part of the hardware lifecycle? Check all that apply. a. b. c. d. 15 | P a g e Retirement Procurement Deployment Network Connectivity [Pick the date] 16 | P a g e SYSTEMS ADMINISTRATION AND MAINTENANCE