Set 9

Ubuntu L2-Corporal Industry Assignments

(Set 9 | Index 81–90) Root Working Directory: ~/kactii27


81. Process Start-Time & Runtime Analysis

Scenario: Ops needs to verify how long critical processes have been running.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named process_runtime

  • Start one or more test processes

  • Inspect start time and elapsed runtime

  • Save observations to runtime.txt

Commands Expected: ps -eo pid,lstart,etime,cmd, date, redirection


82. Memory Mapping Inspection (Read-Only)

Scenario: Engineers want visibility into how memory is mapped for a process.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named memory_maps

  • Start a simple process

  • Inspect its memory map

  • Save sample output to maps.txt

Commands Expected: pmap, /proc/<pid>/maps, redirection


83. File Handle Leakage Detection

Scenario: A process is suspected of leaking file descriptors.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named fd_leak

  • Start a long-running process

  • Observe open file count over time

  • Document findings in fd_leak.txt

Commands Expected: lsof, ls /proc/<pid>/fd, wc -l, redirection


84. CPU Scheduling Policy Awareness

Scenario: Performance varies due to scheduling differences.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named cpu_scheduling

  • Inspect scheduling policy of a process

  • Compare policies (read-only)

  • Save output to scheduling.txt

Commands Expected: chrt -p, ps -o pid,cls,pri,cmd, redirection


85. Disk Read-Ahead & Cache Observation

Scenario: Disk performance tuning is under investigation.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named disk_cache

  • Inspect block device read-ahead settings

  • Observe disk read behavior

  • Save findings to cache.txt

Commands Expected: lsblk -o NAME,RA, blockdev --getra (read-only), redirection


86. Network Packet Loss Pattern Study

Scenario: Intermittent packet loss impacts services.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named packet_loss

  • Ping hosts over longer durations

  • Capture packet loss statistics

  • Save output to packet_loss.txt

Commands Expected: ping -c, redirection


87. File Ownership Transfer Simulation

Scenario: Project ownership changes hands.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named ownership_transfer

  • Create files and directories

  • Change ownership (simulate with current user)

  • Verify recursive changes

  • Save output to ownership_transfer.txt

Commands Expected: chown, ls -lR, stat, redirection


88. Service Dependency Awareness (Read-Only)

Scenario: Understanding service startup dependencies.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named service_deps

  • Inspect dependencies of a system service

  • Identify required and optional units

  • Save output to service_deps.txt

Commands Expected: systemctl list-dependencies, redirection


89. Binary Capability Inspection

Scenario: Security audit checks elevated binary capabilities.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named binary_caps

  • Inspect file capabilities on system binaries

  • Document any findings

  • Save output to caps.txt

Commands Expected: getcap, setcap -r (inspection only), redirection


90. Controlled Crash Observation & Logging

Scenario: Engineers must understand how crashes are reported.

Instructions:

  • Navigate to ~/kactii27

  • Create a folder named crash_observation

  • Trigger a controlled failure

  • Observe error messages and exit codes

  • Save output to crash_log.txt

Commands Expected: false, invalid command execution, $?, error redirection


L2-Corporal Enforcement Rules (Still Absolute)

  • Every assignment must begin with:

  • No scripting

  • No Python

  • No GUI tools

  • CLI only

  • All outputs saved under ~/kactii27


Last updated