Ubuntu L2-Corporal Industry Assignments
(Set 4 | Index 31–40)
Root Working Directory: ~/kactii27
31. Process Resource Spike Investigation
Scenario:
Ops reports sudden CPU and memory spikes.
Instructions:
Create a folder named resource_spike
Capture baseline CPU and memory usage
Start a resource-intensive test process
Capture post-spike metrics
Save comparison to resource_spike.txt
Commands Expected:
top, ps, free -h, kill, redirection
32. File Ownership Consistency Check Across Tree
Scenario:
Mixed ownership is breaking deployments.
Instructions:
Create a folder named ownership_consistency
Create nested files and directories
Inspect ownership recursively
Identify inconsistent ownership
Save findings to ownership_check.txt
Commands Expected:
ls -lR, find, stat, redirection
33. Incremental Backup Simulation (Manual)
Scenario:
Ops wants to verify what changes between backups.
Instructions:
Create a folder named incremental_backup
Capture an initial directory snapshot
Capture a second snapshot
Compare snapshots and document differences
Commands Expected:
ls, find, diff, redirection
34. Disk I/O Observation Task
Scenario:
Application latency may be disk-related.
Instructions:
Create a folder named disk_io
Observe disk activity during file operations
Capture disk usage before and after
Save observations to disk_io.txt
Commands Expected:
iostat (if available), dd, df -h, redirection
35. Advanced Archive Inspection Without Extraction
Scenario:
Validate archive contents without unpacking.
Instructions:
Create a folder named archive_inspection
Create and compress files
Inspect archive contents without extracting
Save output to archive_contents.txt
Commands Expected:
tar -tf, zipinfo, redirection
36. Permission Escalation Risk Simulation
Scenario:
Security wants to understand permission escalation risks.
Instructions:
Create a folder named perm_risk
Apply overly permissive permissions
Demonstrate access implications
Document results in risk_report.txt
Commands Expected:
chmod, ls -l, redirection
37. Multi-User File Access Validation (Simulated)
Scenario:
Files must be shared safely across teams.
Instructions:
Create a folder named shared_access
Validate read/write access logic
Capture permission matrix in shared_access.txt
Commands Expected:
chmod, chgrp, groups, ls -l
38. System Log Volume Analysis
Scenario:
Logs are growing faster than expected.
Instructions:
Create a folder named log_volume
Save findings to log_sizes.txt
Commands Expected:
ls -lh, du -sh, sort -h, redirection
39. Network Latency Comparison Test
Scenario:
Users report slow access to external services.
Instructions:
Create a folder named latency_test
Save outputs to latency_report.txt
Commands Expected:
ping, redirection
40. Controlled Misconfiguration & Recovery Drill
Scenario:
Practice safe recovery from configuration mistakes.
Instructions:
Create a folder named misconfig_recovery
Intentionally misconfigure a test file or permission
Restore correct configuration
Document steps in recovery_log.txt
Commands Expected:
chmod, mv, ls, error observation, redirection