CYB_300_2-2

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

300

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by JusticeJellyfishPerson10226

Report
CYB 300 Module Two Lab CYB 300 2023 Novemeber 5 Lab: Task 2—Use Standard sh Syntax Prompt Response In the lab section “Task 2—Using Standard sh Syntax,” Step 5 , instead of typing “Hello World”, replace the word “World” with your first and last name. Take a screenshot of the output for Step 5. In the lab section “Task 2—Using Standard sh Syntax,” Step 22, run the plabuser.sh script to show the multiple users and their home directories. Type your name at the prompt after the output. Take a screenshot of the output for Step 22 and your name. In the lab section “Task 2—Using Standard sh Syntax,” Step 24, you will write a script called counter.sh, which includes a while loop to count from 0 to 9. Run the counter.sh script and type your name at the prompt after the output. Take a screenshot of the output for Step 24 and your name. In the lab section “Task 2—Using Standard sh Syntax,” Step 25, you will write some code using a for loop without writing a shell script. Type your name at the prompt after the output. Take a screenshot of the output for Step 25 and your name. In the lab section “Task 2—Using Standard sh Syntax,” Step 27, you will use the if loop to write a script called count.sh to check if a number is greater, less than, or equal to 100 and output the results. Type your name at the prompt after the output. Take a screenshot of the output for Step 27 and your name.
In this lab you experimented with the very basics of looping and variable declaration within a script. What are some of the tasks a security practitioner could automate with shell scripts? What are some of the security features that can be done through scripting? Some of the tasks a security practitioner c shell scripts is log scanning to look throug abnormalities in the scripts written. Security features that can be done through numerous but one is user modification an management. Lab: Task 3—Use Command Substitution Prompt Response In the lab section “Task 3—Use Command Substitution,” Step 4, you will write a small script based on command substitution. Create a script called command.sh that will output your computer’s current date and time. Run the script in Step 5 and type your name after the command prompt. Take a screenshot of the output for Step 5 and your name. Within this task, you accessed the Date method. What is the importance of being able to access the Date method, and why is it important to a security analyst? It’s important as a security analyst that we system because we can use this when rest Lab: Task 4—Use the Test Command Prompt Response In the lab section “Task 4—Use the Test Command,” Step 2, you will use test command to compare the numbers 10 and 5 and display a message to the user. Run the test command and type your name after the command prompt. Take a screenshot of the output for Step 2 and your name.tes
A major fact in all programming languages is that they need to be able to compare two values and make a decision based on the outcome. Explain why it is important for a security analyst to be able to compare values and perform actions based on different outcomes. As a security analyst, it is crucial to be ab and perform actions based on different ou can execute specific actions based on pred Additionally, comparing file hashes plays identifying the presence of trojans or othe
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help