Set 3

Ubuntu L2-Corporal Industry Assignments

(Set 3 | Index 21–30) Root Working Directory: ~/kactii27


21. Process Tree Analysis & Impact Assessment

Scenario: An outage investigation requires understanding parent–child process relationships.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named process_tree

  • Display full system process tree

  • Filter processes owned by your user

  • Identify parent and child relationships

  • Save output to process_tree.txt

Commands Expected: pstree, ps -ef, grep, redirection


22. File Permission Drift Detection

Scenario: Permissions have changed unexpectedly over time.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named permission_drift

  • Create files with baseline permissions

  • Modify permissions incrementally

  • Capture before/after permission states

  • Save comparison to drift_report.txt

Commands Expected: chmod, ls -l, stat, redirection


23. Controlled CPU Load Simulation

Scenario: Ops wants to observe system behavior under CPU load.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named cpu_load_test

  • Start a CPU-intensive test process

  • Monitor CPU usage

  • Safely terminate the process

  • Save observations to cpu_load.txt

Commands Expected: yes, top, ps, kill, redirection


24. Disk Usage Growth Tracking

Scenario: Unexpected disk growth is suspected.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named disk_growth

  • Capture initial disk usage

  • Add files to increase usage

  • Capture post-change usage

  • Save comparison to growth_report.txt

Commands Expected: df -h, du -sh, redirection


25. Advanced Text Filtering Pipeline

Scenario: Support must extract actionable data from logs.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named text_pipeline

  • Create a log-style text file

  • Filter, sort, and de-duplicate entries

  • Save final output to filtered_logs.txt

Commands Expected: grep, sort, uniq, pipes (|), redirection


26. Safe Recursive Deletion Review

Scenario: A cleanup task risks deleting critical files.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named safe_cleanup

  • Populate nested directories and files

  • Preview deletion targets

  • Perform controlled recursive deletion

  • Capture actions in cleanup_log.txt

Commands Expected: find, rm -r, ls, redirection


27. Network Interface Change Detection

Scenario: Network drops occur intermittently.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named interface_monitor

  • Capture current interface state

  • Bring an interface down (if permitted) and up

  • Re-capture state

  • Save results to interface_changes.txt

Commands Expected: ip link, ip a, redirection (Use observation only if interface control is restricted)


28. Mount Point Dependency Analysis

Scenario: Services depend on mounted directories.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named mount_dependencies

  • List mounted filesystems

  • Identify bind or nested mounts

  • Document mount relationships

  • Save output to mount_map.txt

Commands Expected: mount, findmnt, df -h, redirection


29. Command Resolution Conflict Investigation

Scenario: Different command versions behave inconsistently.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named command_conflict

  • Identify all paths for a common command

  • Inspect resolution order

  • Document findings in command_resolution.txt

Commands Expected: which -a, type -a, whereis, redirection


30. System Failure Reproduction Log

Scenario: Support must reproduce and document a controlled failure.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named failure_reproduction

  • Execute a failing command intentionally

  • Capture error output and exit status

  • Document steps and results

  • Save output to failure_log.txt

Commands Expected: false, invalid command execution, $?, error redirection


Last updated