Set 1
1. File Permission & Ownership Audit
Scenario: A junior admin is preparing a security audit of project files.
Instructions:
Navigate to
~/kactii27Create a folder named
permission_auditCreate sample files and folders
Apply various permission schemes (owner, group, others)
Use tools to inspect detailed ownership and permissions
Save output to
audit_report.txt
Commands Expected:
chmod, chown, stat, ls -l, redirection
Industry Context: Permission hardening and audit reporting is common in IT security reviews. (csp.gitbook.io)
2. Process Monitoring & Management Task
Scenario: A support engineer must monitor and control system processes during a stress test.
Instructions:
Navigate to
~/kactii27Create a folder named
process_controlRun system monitoring tools to view all processes
Identify top resource users
Terminate a test (dummy) process by PID and by name
Save snapshots to corresponding log files
Commands Expected:
ps, top, htop (install if needed), kill, pkill, redirection
Industry Context: Basic process control is essential for system reliability and troubleshooting. (csp.gitbook.io)
3. Networking Diagnostics Report
Scenario: Network reliability needs verification across endpoints.
Instructions:
Navigate to
~/kactii27Create a folder named
network_diagInspect IP configuration and interface details
Test connectivity to a public host
Fetch a file from a URL using command-line tools
Save all outputs under relevant filenames
Commands Expected:
ip a, ping, curl, wget, redirection
Industry Context: Network command usage is common for connectivity checks and remote diagnostics. (csp.gitbook.io)
4. Compression & Archival Workflow
Scenario: A release engineer must archive build artifacts and extract them for verification.
Instructions:
Navigate to
~/kactii27Create a folder named
compression_taskGenerate some dummy files
Create compressed archives in both tar and zip formats
Extract them to verify integrity
Save log outputs of the operations
Commands Expected:
tar, zip, unzip, ls, redirection
Industry Context: Archiving and packaging are central to build pipelines and release processes. (csp.gitbook.io)
5. Disk & Block Device Inspection
Scenario: A cloud ops specialist verifies attached storage and mount points.
Instructions:
Navigate to
~/kactii27Create a folder named
disk_inspectionList block devices and detail mount points
Simulate a mount (can be to a temp directory)
Cleanly unmount
Save outputs to files
Commands Expected:
lsblk, mount, umount, redirection
Industry Context: Disk inventory and mount validation is common in ops before deployments. (csp.gitbook.io)
6. Terminal Productivity Enhancement
Scenario: You’re tasked to streamline frequent dev ops commands.
Instructions:
Navigate to
~/kactii27Create a folder named
productivityCreate and test aliases for common commands (e.g., long listings)
Demonstrate the use of watch for monitoring
Save aliases and demonstration outputs
Commands Expected:
alias, watch, history, redirection
Industry Context: Aliases and monitoring improve efficiency for daily operations. (csp.gitbook.io)
7. Text Editing & Pipeline Input Exploration
Scenario: A QA engineer must prepare and process lists of files.
Instructions:
Navigate to
~/kactii27Create a folder named
text_edit_inputEdit a sample file using the terminal editor
Create a list of items and use pipeline input tools to transform or act on them
Save processed output
Commands Expected:
nano, xargs, ls, pipeline usage, redirection
Industry Context: Terminal editing and input transformation is foundational for text-based workflows. (csp.gitbook.io)
8. Cross-User File Ownership Reset Task
Scenario: A sysadmin must reset ownership after a user role change.
Instructions:
Navigate to
~/kactii27Create a folder named
ownership_resetCreate files owned by a test user
Change ownership to another user (simulate with your username)
Validate the change and document
Commands Expected:
sudo chown, stat, ls -l, redirection
Industry Context: User role transition often requires ownership corrections of resources. (csp.gitbook.io)
9. Real-world Networking Timeout & Download Test
Scenario: Network operations must verify reliability under time constraints.
Instructions:
Navigate to
~/kactii27Create a folder named
network_testUse curl with timeouts to fetch a remote resource
Log timing and success/failure results
Compare with a wget download attempt
Commands Expected:
curl --max-time, wget, ping, redirection
Industry Context: Timeout-aware network tests are valuable in flaky network conditions. (csp.gitbook.io)
10. Archive Verification & Recovery
Scenario: A backup process produces compressed archives; this task verifies recoverability.
Instructions:
Navigate to
~/kactii27Create a folder named
archive_verifyCreate an archive
Delete the original
Attempt extraction and verify recovered content
Log results
Commands Expected:
tar, gzip, unzip, ls, redirection
Industry Context: Reliable backup and restore verification appears in disaster recovery plans. (csp.gitbook.io)
Last updated