Set 7

61. Compliance Review – Extract Policy Violations

Scenario Compliance team needs to isolate policy violation entries from audit logs.

Instructions:

  • Navigate to ~/kactii29

  • Create folder policy_violations

  • Assume audit.log exists

  • Extract lines containing VIOLATION

  • Save output to violations.log

Commands Expected: grep, output redirection


62. Capacity Evidence – Directory Size Compliance

Scenario Auditors require proof that directory sizes are within allowed thresholds.

Instructions:

  • Navigate to ~/kactii29

  • Create capacity_evidence

  • Measure directory sizes

  • Display results in human-readable format

  • Save output to capacity.log

Commands Expected: du -h


63. Access Review – Logged-In User Snapshot

Scenario Access review demands evidence of active users at audit time.

Instructions:

  • Navigate to ~/kactii29

  • Create access_review

  • Capture logged-in users

  • Append date and time

  • Save to access_review.log

Commands Expected: who, date, output redirection


64. Toolchain Audit – Verify Approved Commands

Scenario Audit requires confirmation that approved system utilities are present.

Instructions:

  • Navigate to ~/kactii29

  • Create toolchain_audit

  • Locate paths for grep, sort, and uniq

  • Save output to approved_tools.txt

Commands Expected: which


65. Service Compliance – Scheduler Status Check

Scenario Compliance team must confirm the scheduling service is active.

Instructions:

  • Navigate to ~/kactii29

  • Create scheduler_compliance

  • Check cron service status

  • Start service if inactive

  • Save output to cron_compliance.txt

Commands Expected: systemctl status, systemctl start


66. Deferred Task Compliance – Review One-Time Jobs

Scenario Auditors request visibility into all one-time scheduled tasks.

Instructions:

  • Navigate to ~/kactii29

  • Create deferred_compliance

  • List all scheduled at jobs

  • Save output to deferred_jobs.txt

Commands Expected: atq


67. Environment Governance – Runtime Variable Capture

Scenario Governance review requires capturing environment variables used by processes.

Instructions:

  • Navigate to ~/kactii29

  • Create env_governance

  • Display all environment variables

  • Save output to env_governance.txt

Commands Expected: printenv


68. Network Compliance – Listening Port Inventory

Scenario Security audit requires an inventory of exposed listening ports.

Instructions:

  • Navigate to ~/kactii29

  • Create network_compliance

  • Capture all listening TCP and UDP sockets

  • Save output to ports_inventory.txt

Commands Expected: ss -tuln


69. Data Governance – Unique Record Normalization

Scenario Data governance team needs a normalized list of unique records.

Instructions:

  • Navigate to ~/kactii29

  • Create record_normalization

  • Assume records.log exists

  • Sort and remove duplicates

  • Save to unique_records.txt

Commands Expected: sort, uniq


70. Availability Compliance – Uptime Evidence Capture

Scenario Regulatory review requires proof of system availability.

Instructions:

  • Navigate to ~/kactii29

  • Create availability_compliance

  • Capture system uptime

  • Append timestamp

  • Save to availability_compliance.log

Commands Expected: uptime, date, output redirection


Last updated