Set 4

Ubuntu L2-Corporal Industry Assignments

(Set 4 | Index 31–40) Root Working Directory: ~/kactii27


31. Process Resource Spike Investigation

Scenario: Ops reports sudden CPU and memory spikes.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named resource_spike

  • Capture baseline CPU and memory usage

  • Start a resource-intensive test process

  • Capture post-spike metrics

  • Save comparison to resource_spike.txt

Commands Expected: top, ps, free -h, kill, redirection


32. File Ownership Consistency Check Across Tree

Scenario: Mixed ownership is breaking deployments.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named ownership_consistency

  • Create nested files and directories

  • Inspect ownership recursively

  • Identify inconsistent ownership

  • Save findings to ownership_check.txt

Commands Expected: ls -lR, find, stat, redirection


33. Incremental Backup Simulation (Manual)

Scenario: Ops wants to verify what changes between backups.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named incremental_backup

  • Capture an initial directory snapshot

  • Modify and add files

  • Capture a second snapshot

  • Compare snapshots and document differences

Commands Expected: ls, find, diff, redirection


34. Disk I/O Observation Task

Scenario: Application latency may be disk-related.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named disk_io

  • Observe disk activity during file operations

  • Capture disk usage before and after

  • Save observations to disk_io.txt

Commands Expected: iostat (if available), dd, df -h, redirection


35. Advanced Archive Inspection Without Extraction

Scenario: Validate archive contents without unpacking.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named archive_inspection

  • Create and compress files

  • Inspect archive contents without extracting

  • Save output to archive_contents.txt

Commands Expected: tar -tf, zipinfo, redirection


36. Permission Escalation Risk Simulation

Scenario: Security wants to understand permission escalation risks.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named perm_risk

  • Apply overly permissive permissions

  • Demonstrate access implications

  • Restore safe permissions

  • Document results in risk_report.txt

Commands Expected: chmod, ls -l, redirection


37. Multi-User File Access Validation (Simulated)

Scenario: Files must be shared safely across teams.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named shared_access

  • Assign group permissions

  • Validate read/write access logic

  • Capture permission matrix in shared_access.txt

Commands Expected: chmod, chgrp, groups, ls -l


38. System Log Volume Analysis

Scenario: Logs are growing faster than expected.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named log_volume

  • Identify large log files

  • Sort logs by size

  • Save findings to log_sizes.txt

Commands Expected: ls -lh, du -sh, sort -h, redirection


39. Network Latency Comparison Test

Scenario: Users report slow access to external services.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named latency_test

  • Ping multiple hosts

  • Compare latency results

  • Save outputs to latency_report.txt

Commands Expected: ping, redirection


40. Controlled Misconfiguration & Recovery Drill

Scenario: Practice safe recovery from configuration mistakes.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named misconfig_recovery

  • Intentionally misconfigure a test file or permission

  • Observe failure behavior

  • Restore correct configuration

  • Document steps in recovery_log.txt

Commands Expected: chmod, mv, ls, error observation, redirection


Last updated