CYB 230 Module Four Lab Worksheet Joshua Crowley (1)
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
230
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by ColonelOryx2298
CYB 230 Module Four Lab Worksheet
Joshua Crowley
09/24/2023
CYB- 230
Professor Jennings-Roche
Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information.
Lab: Working With Files
Prompt
Response
In the lab section “Using Chmod to Change Permissions,”
Step 3
, insert
your name at the command line below the output and include it in your
screenshot.
Prompt
Response
In the lab section “Setting Special Permissions,”
Step 13
, insert your
name at the command line below the output and include it in your
screenshot.
Implementing the sticky bit on the directory can stop people from
accidentally deleting files that they don’t own. How can this technique
be used to implement the concept of least privilege, and how can it be
used to assure file availability?
The sticky bit can be used with the concept of least privilege as it only allows the
people who should have access to the file location or directory to be able to utilize
it or remove it from the system. It will help prevent users from accidentally making
edits or removing the files and help with the security aspect as a hacker would need
the correct permissions to access the file.
Lab: Permissions, Users, and Groups in Linux
Prompt
Response
After completing the lab section “Adding Groups, Users, and
Passwords,”
repeat Steps 9 through 15
and add another user using your
first name. Provide a screenshot of the
cat
etc/passwd
command when
you are done.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Prompt
Response
After completing the lab section “Absolute Permission,” repeat the
process using your first name as the text file. Provide a screenshot after
Step 18
.
Note:
By default, some computer systems use the key sequence
Ctrl+Alt+F1
to access a shortcut for other programs such as the Intel
Graphics Control Panel. If this is the case, you will need to change the
key sequence from the default to complete this step.
To exit the tty1 or tty2 window, use the key sequence
Ctrl+Alt+F7
.
Using the
chmod
command, which commands would you use to set the
following permissions to a file called
Answers.txt
? (Please provide the
one line used at the command line for each bulleted item.)
User (read and write), group (execute) other (execute)
User (read, write, execute), group (read and execute) other
(write and execute)
User (write), group (read) other (none)
-
chmod 611 Answers.txt
-
chmod 753 Answers.txt
-
chmod 240 Answers.txt
Lab: Log Analysis
Prompt
Response
In the lab section “Examining Windows Event Logs, IIs Logs, and
Scheduled Tasks,”
Step 23
, add your name as the top line of the file and
then take a screenshot.
Prompt
Response
In the lab section “Examining Linux Log Files,”
Step 38
, insert your name
at the command line below the output and include it in your
screenshot.
What is the importance of maintaining clean log files that are well
formatted?
It is critical to maintain clean log files that have a good format for ease of use and
research. Having well maintained log files that are easy to search through can help
detect potential threats quicker, more efficiently and easier. It can help determine
unauthorized access attempts, and breaches that have occurred. Having them easily
organized to find the most recent access and easy to read allows for multiple IT
users to easily locate and determine potential threats. This is especially critical in
emergency situations where the information is needed quickly.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help