Ubuntu L2-Corporal Industry Assignments
(Set 5 | Index 41–50)
Root Working Directory: ~/kactii27
41. Process Memory Leak Observation (Controlled)
Scenario:
A service is suspected of gradually consuming memory.
Instructions:
Create a folder named memory_observation
Start a long-running test process
Capture memory usage at intervals
Terminate the process safely
Save observations to memory_trend.txt
Commands Expected:
top, ps, watch, kill, redirection
42. Recursive Permission Correction Drill
Scenario:
A directory tree has inconsistent permissions.
Instructions:
Create a folder named permission_fix
Populate nested directories and files
Apply incorrect permissions intentionally
Correct permissions recursively
Capture before/after states in perm_fix.txt
Commands Expected:
chmod -R, ls -lR, redirection
43. Network Reachability Degradation Test
Scenario:
Connectivity drops intermittently.
Instructions:
Create a folder named reachability_test
Ping a host with different intervals and counts
Capture packet loss and latency
Save results to reachability.txt
Commands Expected:
ping -c, ping -i, redirection
44. File System Consistency Awareness Drill
Scenario:
Ops wants junior staff to understand fs integrity tools.
Instructions:
Create a folder named fs_consistency
Inspect mounted file systems
Identify file system types
Document appropriate consistency tools (no execution)
Save findings to fs_report.txt
Commands Expected:
df -T, lsblk -f, redirection
45. Selective Log Extraction by Time Window
Scenario:
Errors occurred within a specific time range.
Instructions:
Create a folder named log_time_filter
Create a timestamped log file
Extract entries from a specific window
Save results to time_filtered.txt
Commands Expected:
grep, sed, awk (read-only use), redirection
46. User Group Membership Validation
Scenario:
A user reports missing permissions.
Instructions:
Create a folder named group_validation
Inspect current user’s group memberships
Validate access logic against permissions
Save output to groups.txt
Commands Expected:
groups, id, ls -l, redirection
47. File Lock Awareness & Detection
Scenario:
A file cannot be modified due to an active lock.
Instructions:
Create a folder named file_locking
Open a file with a process
Save findings to locks.txt
Commands Expected:
lsof, fuser, redirection
48. Controlled Disk Fill & Alert Observation
Scenario:
Disk alerts must be understood before production.
Instructions:
Create a folder named disk_fill
Gradually create large files
Monitor disk usage growth
Stop before critical thresholds
Save observations to disk_fill.txt
Commands Expected:
dd, df -h, watch, redirection
49. PATH Shadowing & Resolution Risk Analysis
Scenario:
Wrong binaries are executed due to PATH ordering.
Instructions:
Create a folder named path_shadowing
Create a dummy executable
Observe command resolution behavior
Document findings in path_shadow.txt
Commands Expected:
export, which, type, chmod +x
50. Controlled Privilege Boundary Awareness Drill
Scenario:
Understand where privilege boundaries exist.
Instructions:
Create a folder named privilege_boundaries
Attempt privileged operations without sudo
Identify which operations require elevation
Save output to privilege.txt
Commands Expected:
mount, chown, permission errors, redirection