CYB 230 Module Four Lab Worksheet Damien McClure

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by GeneralTroutMaster802

Report
CYB 230 Module Four Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Working With Files Prompt Response In the lab section “Using Chmod to Change Permissions,” Step 3 , insert your name at the command line below the output and include it in your screenshot.
Prompt Response In the lab section “Setting Special Permissions,” Step 13 , insert your name at the command line below the output and include it in your screenshot. Implementing the sticky bit on the directory can stop people from accidentally deleting files that they don’t own. How can this technique be used to implement the concept of least privilege, and how can it be used to assure file availability? When implementing the sticky bit on the directory, only the owner of a file is able to delete or rename the file, even if another user has access to read and write for the same file. This in turn can create a zero-trust environment in which only the owner of the file is trusted and everyone else is required to request permission from the owner of said file. This in turn assures file availability, as it will remain there until the owner deletes or renames it. Lab: Permissions, Users, and Groups in Linux Prompt Response After completing the lab section “Adding Groups, Users, and Passwords,” repeat Steps 9 through 15 and add another user using your first name. Provide a screenshot of the cat etc/passwd command when you are done. After completing the lab section “Absolute Permission,” repeat the process using your first name as the text file. Provide a screenshot after Step 18 . Note: By default, some computer systems use the key sequence Ctrl+Alt+F1 to access a shortcut for other programs such as the Intel Graphics Control Panel. If this is the case, you will need to change the key sequence from the default to complete this step. To exit the tty1 or tty2 window, use the key sequence Ctrl+Alt+F7 .
Prompt Response Using the chmod command, which commands would you use to set the following permissions to a file called Answers.txt ? (Please provide the one line used at the command line for each bulleted item.) User (read and write), group (execute) other (execute) User (read, write, execute), group (read and execute) other (write and execute) User (write), group (read) other (none) chmod 611 Answers.txt chmod 753 Answer.txt chmod 240 Answer.txt Lab: Log Analysis Prompt Response In the lab section “Examining Windows Event Logs, IIs Logs, and Scheduled Tasks,” Step 23 , add your name as the top line of the file and then take a screenshot.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Prompt Response In the lab section “Examining Linux Log Files,” Step 38 , insert your name at the command line below the output and include it in your screenshot. What is the importance of maintaining clean log files that are well formatted? Having an understanding of what is happening on your machine is critical to understanding how to solve errors that may come up. Inevitably, a problem will arise and having a clean log files that are formatted in a way that a human can easily read them provides a vast amount of information about each event that occurs with both software and hardware in the system that can assist in figuring out where the problem at hand stems from.