Set 1

1. File Permission & Ownership Audit

Scenario: A junior admin is preparing a security audit of project files.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named permission_audit

  • Create sample files and folders

  • Apply various permission schemes (owner, group, others)

  • Use tools to inspect detailed ownership and permissions

  • Save output to audit_report.txt

Commands Expected: chmod, chown, stat, ls -l, redirection

Industry Context: Permission hardening and audit reporting is common in IT security reviews. (csp.gitbook.ioarrow-up-right)


2. Process Monitoring & Management Task

Scenario: A support engineer must monitor and control system processes during a stress test.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named process_control

  • Run system monitoring tools to view all processes

  • Identify top resource users

  • Terminate a test (dummy) process by PID and by name

  • Save snapshots to corresponding log files

Commands Expected: ps, top, htop (install if needed), kill, pkill, redirection

Industry Context: Basic process control is essential for system reliability and troubleshooting. (csp.gitbook.ioarrow-up-right)


3. Networking Diagnostics Report

Scenario: Network reliability needs verification across endpoints.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named network_diag

  • Inspect IP configuration and interface details

  • Test connectivity to a public host

  • Fetch a file from a URL using command-line tools

  • Save all outputs under relevant filenames

Commands Expected: ip a, ping, curl, wget, redirection

Industry Context: Network command usage is common for connectivity checks and remote diagnostics. (csp.gitbook.ioarrow-up-right)


4. Compression & Archival Workflow

Scenario: A release engineer must archive build artifacts and extract them for verification.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named compression_task

  • Generate some dummy files

  • Create compressed archives in both tar and zip formats

  • Extract them to verify integrity

  • Save log outputs of the operations

Commands Expected: tar, zip, unzip, ls, redirection

Industry Context: Archiving and packaging are central to build pipelines and release processes. (csp.gitbook.ioarrow-up-right)


5. Disk & Block Device Inspection

Scenario: A cloud ops specialist verifies attached storage and mount points.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named disk_inspection

  • List block devices and detail mount points

  • Simulate a mount (can be to a temp directory)

  • Cleanly unmount

  • Save outputs to files

Commands Expected: lsblk, mount, umount, redirection

Industry Context: Disk inventory and mount validation is common in ops before deployments. (csp.gitbook.ioarrow-up-right)


6. Terminal Productivity Enhancement

Scenario: You’re tasked to streamline frequent dev ops commands.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named productivity

  • Create and test aliases for common commands (e.g., long listings)

  • Demonstrate the use of watch for monitoring

  • Save aliases and demonstration outputs

Commands Expected: alias, watch, history, redirection

Industry Context: Aliases and monitoring improve efficiency for daily operations. (csp.gitbook.ioarrow-up-right)


7. Text Editing & Pipeline Input Exploration

Scenario: A QA engineer must prepare and process lists of files.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named text_edit_input

  • Edit a sample file using the terminal editor

  • Create a list of items and use pipeline input tools to transform or act on them

  • Save processed output

Commands Expected: nano, xargs, ls, pipeline usage, redirection

Industry Context: Terminal editing and input transformation is foundational for text-based workflows. (csp.gitbook.ioarrow-up-right)


8. Cross-User File Ownership Reset Task

Scenario: A sysadmin must reset ownership after a user role change.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named ownership_reset

  • Create files owned by a test user

  • Change ownership to another user (simulate with your username)

  • Validate the change and document

Commands Expected: sudo chown, stat, ls -l, redirection

Industry Context: User role transition often requires ownership corrections of resources. (csp.gitbook.ioarrow-up-right)


9. Real-world Networking Timeout & Download Test

Scenario: Network operations must verify reliability under time constraints.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named network_test

  • Use curl with timeouts to fetch a remote resource

  • Log timing and success/failure results

  • Compare with a wget download attempt

Commands Expected: curl --max-time, wget, ping, redirection

Industry Context: Timeout-aware network tests are valuable in flaky network conditions. (csp.gitbook.ioarrow-up-right)


10. Archive Verification & Recovery

Scenario: A backup process produces compressed archives; this task verifies recoverability.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named archive_verify

  • Create an archive

  • Delete the original

  • Attempt extraction and verify recovered content

  • Log results

Commands Expected: tar, gzip, unzip, ls, redirection

Industry Context: Reliable backup and restore verification appears in disaster recovery plans. (csp.gitbook.ioarrow-up-right)


Last updated