Set 7
61. Compliance Review – Extract Policy Violations
Scenario Compliance team needs to isolate policy violation entries from audit logs.
Instructions:
Navigate to
~/kactii29Create folder
policy_violationsAssume
audit.logexistsExtract lines containing
VIOLATIONSave output to
violations.log
Commands Expected:
grep, output redirection
62. Capacity Evidence – Directory Size Compliance
Scenario Auditors require proof that directory sizes are within allowed thresholds.
Instructions:
Navigate to
~/kactii29Create
capacity_evidenceMeasure directory sizes
Display results in human-readable format
Save output to
capacity.log
Commands Expected:
du -h
63. Access Review – Logged-In User Snapshot
Scenario Access review demands evidence of active users at audit time.
Instructions:
Navigate to
~/kactii29Create
access_reviewCapture logged-in users
Append date and time
Save to
access_review.log
Commands Expected:
who, date, output redirection
64. Toolchain Audit – Verify Approved Commands
Scenario Audit requires confirmation that approved system utilities are present.
Instructions:
Navigate to
~/kactii29Create
toolchain_auditLocate paths for
grep,sort, anduniqSave output to
approved_tools.txt
Commands Expected:
which
65. Service Compliance – Scheduler Status Check
Scenario Compliance team must confirm the scheduling service is active.
Instructions:
Navigate to
~/kactii29Create
scheduler_complianceCheck cron service status
Start service if inactive
Save output to
cron_compliance.txt
Commands Expected:
systemctl status, systemctl start
66. Deferred Task Compliance – Review One-Time Jobs
Scenario Auditors request visibility into all one-time scheduled tasks.
Instructions:
Navigate to
~/kactii29Create
deferred_complianceList all scheduled
atjobsSave output to
deferred_jobs.txt
Commands Expected:
atq
67. Environment Governance – Runtime Variable Capture
Scenario Governance review requires capturing environment variables used by processes.
Instructions:
Navigate to
~/kactii29Create
env_governanceDisplay all environment variables
Save output to
env_governance.txt
Commands Expected:
printenv
68. Network Compliance – Listening Port Inventory
Scenario Security audit requires an inventory of exposed listening ports.
Instructions:
Navigate to
~/kactii29Create
network_complianceCapture all listening TCP and UDP sockets
Save output to
ports_inventory.txt
Commands Expected:
ss -tuln
69. Data Governance – Unique Record Normalization
Scenario Data governance team needs a normalized list of unique records.
Instructions:
Navigate to
~/kactii29Create
record_normalizationAssume
records.logexistsSort and remove duplicates
Save to
unique_records.txt
Commands Expected:
sort, uniq
70. Availability Compliance – Uptime Evidence Capture
Scenario Regulatory review requires proof of system availability.
Instructions:
Navigate to
~/kactii29Create
availability_complianceCapture system uptime
Append timestamp
Save to
availability_compliance.log
Commands Expected:
uptime, date, output redirection
Last updated