Set 3
Ubuntu L2-Corporal Industry Assignments
(Set 3 | Index 21–30)
Root Working Directory: ~/kactii27
21. Process Tree Analysis & Impact Assessment
Scenario: An outage investigation requires understanding parent–child process relationships.
Instructions:
Navigate to
~/kactii27Create a folder named
process_treeDisplay full system process tree
Filter processes owned by your user
Identify parent and child relationships
Save output to
process_tree.txt
Commands Expected:
pstree, ps -ef, grep, redirection
22. File Permission Drift Detection
Scenario: Permissions have changed unexpectedly over time.
Instructions:
Navigate to
~/kactii27Create a folder named
permission_driftCreate files with baseline permissions
Modify permissions incrementally
Capture before/after permission states
Save comparison to
drift_report.txt
Commands Expected:
chmod, ls -l, stat, redirection
23. Controlled CPU Load Simulation
Scenario: Ops wants to observe system behavior under CPU load.
Instructions:
Navigate to
~/kactii27Create a folder named
cpu_load_testStart a CPU-intensive test process
Monitor CPU usage
Safely terminate the process
Save observations to
cpu_load.txt
Commands Expected:
yes, top, ps, kill, redirection
24. Disk Usage Growth Tracking
Scenario: Unexpected disk growth is suspected.
Instructions:
Navigate to
~/kactii27Create a folder named
disk_growthCapture initial disk usage
Add files to increase usage
Capture post-change usage
Save comparison to
growth_report.txt
Commands Expected:
df -h, du -sh, redirection
25. Advanced Text Filtering Pipeline
Scenario: Support must extract actionable data from logs.
Instructions:
Navigate to
~/kactii27Create a folder named
text_pipelineCreate a log-style text file
Filter, sort, and de-duplicate entries
Save final output to
filtered_logs.txt
Commands Expected:
grep, sort, uniq, pipes (|), redirection
26. Safe Recursive Deletion Review
Scenario: A cleanup task risks deleting critical files.
Instructions:
Navigate to
~/kactii27Create a folder named
safe_cleanupPopulate nested directories and files
Preview deletion targets
Perform controlled recursive deletion
Capture actions in
cleanup_log.txt
Commands Expected:
find, rm -r, ls, redirection
27. Network Interface Change Detection
Scenario: Network drops occur intermittently.
Instructions:
Navigate to
~/kactii27Create a folder named
interface_monitorCapture current interface state
Bring an interface down (if permitted) and up
Re-capture state
Save results to
interface_changes.txt
Commands Expected:
ip link, ip a, redirection
(Use observation only if interface control is restricted)
28. Mount Point Dependency Analysis
Scenario: Services depend on mounted directories.
Instructions:
Navigate to
~/kactii27Create a folder named
mount_dependenciesList mounted filesystems
Identify bind or nested mounts
Document mount relationships
Save output to
mount_map.txt
Commands Expected:
mount, findmnt, df -h, redirection
29. Command Resolution Conflict Investigation
Scenario: Different command versions behave inconsistently.
Instructions:
Navigate to
~/kactii27Create a folder named
command_conflictIdentify all paths for a common command
Inspect resolution order
Document findings in
command_resolution.txt
Commands Expected:
which -a, type -a, whereis, redirection
30. System Failure Reproduction Log
Scenario: Support must reproduce and document a controlled failure.
Instructions:
Navigate to
~/kactii27Create a folder named
failure_reproductionExecute a failing command intentionally
Capture error output and exit status
Document steps and results
Save output to
failure_log.txt
Commands Expected:
false, invalid command execution, $?, error redirection
Last updated