Set 3
21. Log Investigation – Extract Warning Messages
Scenario Operations team needs all warning-level messages isolated from system logs for trend analysis.
Instructions:
Navigate to
~/kactii29Create folder
warning_logsAssume
system.logexistsExtract lines containing
WARNSave results to
warnings.log
Commands Expected:
grep, output redirection
22. Resource Analysis – Identify Top Disk Consumers
Scenario Infra team needs a quick breakdown of disk usage to identify growth hotspots.
Instructions:
Navigate to
~/kactii29Create
disk_consumersMeasure disk usage of directories
Sort results in human-readable order
Save to
disk_usage.txt
Commands Expected:
du -h, sort -h
23. User Presence Audit – Capture Login Snapshot
Scenario Security wants evidence of user presence during a specific time window.
Instructions:
Navigate to
~/kactii29Create
login_snapshotCapture logged-in users
Append timestamp
Save to
logins.txt
Commands Expected:
who, date, output redirection
24. Command Verification – Ensure Admin Tools Exist
Scenario Before a maintenance window, engineers must confirm administrative tools are installed.
Instructions:
Navigate to
~/kactii29Create
admin_tools_checkLocate paths for
uptime,ss, andsystemctlSave output to
admin_tools.txt
Commands Expected:
which
25. Service Recovery – Restart Critical Service
Scenario Monitoring detected instability in the scheduling service.
Instructions:
Navigate to
~/kactii29Create
service_recoveryCheck
cronservice statusRestart service
Verify status after restart
Commands Expected:
systemctl status, systemctl restart
26. Deferred Execution – Schedule One-Time Cleanup
Scenario Platform team wants a one-time cleanup job to run later without cron persistence.
Instructions:
Navigate to
~/kactii29Create
one_time_jobSchedule a cleanup script using
atVerify job is scheduled
Commands Expected:
at, atq
27. Environment Inspection – Validate PATH Integrity
Scenario Application binaries are not resolving correctly; engineers must inspect environment paths.
Instructions:
Navigate to
~/kactii29Create
path_validationDisplay environment variables
Extract PATH variable
Save to
path.txt
Commands Expected:
printenv, grep
28. Network Audit – Capture Active Listeners
Scenario Security requires a pre-deployment snapshot of active listening ports.
Instructions:
Navigate to
~/kactii29Create
listener_auditCapture TCP/UDP listening sockets
Save output to
listeners.txt
Commands Expected:
ss -tuln
29. Text Normalization – Unique Sorted Hostnames
Scenario Infrastructure team needs a clean list of unique hostnames from collected data.
Instructions:
Navigate to
~/kactii29Create
hostname_cleanupAssume
hosts.txtexistsSort and remove duplicates
Save to
unique_hosts.txt
Commands Expected:
sort, uniq
30. System Stability – Capture Uptime Evidence
Scenario Management requests proof of uninterrupted system availability.
Instructions:
Navigate to
~/kactii29Create
stability_evidenceCapture uptime
Append timestamp
Save to
stability.log
Commands Expected:
uptime, date, output redirection
Last updated