CYB 230 Module Four Lab Worksheet Michael_Lara
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
230
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by JudgeMoonKingfisher28
CYB 230 Module Four Lab Worksheet
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Working With Files
Prompt
Response
In the lab section “Using Chmod to Change Permissions,” Step 3
, insert your name at the command line below the output and include it in your screenshot.
Prompt
Response
In the lab section “Setting Special Permissions,” Step 13
, insert your name at the command line below the output and include it in your screenshot.
Prompt
Response
Implementing the sticky bit on the directory can stop people from accidentally deleting files that they don’t own. How can this technique be used to implement the concept of least privilege, and how can it be used to assure file availability?
Implementing the sticky bit on a directory in a system restricts file deletion within that directory to the file's owner or the root
user, regardless of the directory's general write permissions. This implements concept of least privilege by ensuring that users have only the necessary permissions to interact with files they own. It also enhances file availability by preventing accidental or unauthorized deletion, thereby maintaining consistent access to the files for their rightful owners.
Lab: Permissions, Users, and Groups in Linux
Prompt
Response
After completing the lab section “Adding Groups, Users, and Passwords,” repeat Steps 9 through 15
and add another user using your first name. Provide a screenshot of the cat
etc/passwd
command when you are done.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Prompt
Response
After completing the lab section “Absolute Permission,” repeat the process using your first name as the text file. Provide a screenshot after Step 18
.
Note:
By default, some computer systems use the key sequence Ctrl+Alt+F1
to access a shortcut for other programs such as the Intel
Graphics Control Panel. If this is the case, you will need to change the key sequence from the default to complete this step.
To exit the tty1 or tty2 window, use the key sequence Ctrl+Alt+F7
.
[Insert screenshot.]
Using the chmod
command, which commands would you use to set the following permissions to a file called Answers.txt
? (Please provide the one line used at the command line for each bulleted item.)
User (read and write), group (execute) other (execute)
User (read, write, execute), group (read and execute) other (write and execute)
User (write), group (read) other (none)
chmod 621 Answer.txt
chmod 753 Answer.txt
chmod 240 Answer.txt
Lab: Log Analysis
Prompt
Response
In the lab section “Examining Windows Event Logs, IIs Logs, and Scheduled Tasks,” Step 23
, add your name as the top line of the file and then take a screenshot.
.]
In the lab section “Examining Linux Log Files,” Step 38
, insert your name
at the command line below the output and include it in your screenshot.
[Insert screenshot.]
What is the importance of maintaining clean log files that are well formatted?
Maintaining clean and well-formatted log files is crucial for efficient and accurate analysis, as it enables easier identification of trends, anomalies, and potential security threats.