Set 2

Ubuntu L2-Corporal Industry Assignments

(Set 2 | Index 11–20) Root Working Directory: ~/kactii27


11. Process Priority & Niceness Control

Scenario: A production process is starving other workloads.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named process_priority

  • Start a long-running test process

  • Inspect its priority

  • Change its nice value

  • Capture before/after state in priority_report.txt

Commands Expected: ps, top, nice, renice, redirection


12. Signal Handling & Graceful Termination

Scenario: An application must be stopped without data loss.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named signal_handling

  • Start a test process

  • Send different signals (TERM vs KILL)

  • Observe behavior differences

  • Document results in signals.txt

Commands Expected: kill, kill -l, ps, redirection


13. Advanced File Search with Conditions

Scenario: Ops must locate files meeting strict criteria.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named advanced_find

  • Create files with different sizes, names, and permissions

  • Search using multiple conditions (name + size + type)

  • Save output to find_results.txt

Commands Expected: find, logical operators, redirection


14. File Permission Mask (umask) Enforcement

Scenario: Default permissions must comply with policy.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named umask_policy

  • Display current umask

  • Temporarily change umask

  • Create files and directories

  • Verify resulting permissions

  • Save output to umask_policy.txt

Commands Expected: umask, touch, mkdir, ls -l, redirection


15. Network Port & Socket Inspection

Scenario: Security team requests a live port inventory.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named port_inspection

  • List listening TCP/UDP ports

  • Identify owning processes

  • Save snapshot to ports.txt

Commands Expected: ss, netstat, lsof, redirection


16. Mount Failure Simulation & Recovery

Scenario: A mount point fails during deployment.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named mount_recovery

  • Attempt an invalid mount (safe, non-destructive)

  • Capture error output

  • Demonstrate correct mount syntax

  • Save logs to mount_errors.txt

Commands Expected: mount, umount, error redirection


17. Large File Stream Processing

Scenario: Logs are too large to open normally.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named stream_processing

  • Generate a large text file

  • View partial content safely

  • Extract specific sections

  • Save output to stream_output.txt

Commands Expected: head, tail, less, redirection


18. File Descriptor & Resource Limit Audit

Scenario: System instability suspected due to resource exhaustion.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named resource_limits

  • Inspect open file limits

  • Check current usage

  • Save snapshot to limits.txt

Commands Expected: ulimit, lsof, /proc, redirection


19. Background Job Control & Recovery

Scenario: A background task must be paused and resumed.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named job_control

  • Run a process in background

  • Suspend and resume it

  • Bring it to foreground

  • Capture job states in jobs.txt

Commands Expected: &, jobs, bg, fg, Ctrl+Z


20. Controlled Archive Corruption Test

Scenario: Backup integrity must be validated.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named archive_corruption

  • Create and compress files

  • Intentionally corrupt the archive

  • Attempt extraction

  • Capture errors and behavior in corruption_report.txt

Commands Expected: tar, gzip, gunzip, error output redirection


Last updated