The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
. File Permissions, Security, and LogsIn this section, you will investigate three trouble tickets that you have received regarding some issues that have arisen related to the UNIX accounts ofthree employees.A. Issues with UNIX Accounts: For each issue listed, find the problem (document this by taking a screenshot of the incorrect configuration and ascreenshot of the error message within the corresponding log file) and document the corrective actions to resolve each problem.1. Employee 1 (Bob): Contacted by the Information Assurance (IA) Department and informed that his account is in violation of companypolicy and that his password is visible in plain-text. His account was locked.Incorrect configuration (screenshot):Error message in log (screenshot):Corrective actions (typed response)?2. Employee 2 (Frank): Unable to log into his UNIX account. He receives the error message “su: failed to execute /dev/null:Permission denied.”Incorrect configuration (screenshot):Error message in log (screenshot):Corrective actions (typed response)?3. Employee 3 (Henry): Reports that he receives the following error message when he logs into his UNIX account: “warning: cannotchange directory to /home/henry: Permission denied” followed by the error “-bash: /home/henry/.bash_profile:Permission denied”. Oddly, his command prompt is different from what he usually sees as well.What is wrong (typed response)?Corrective actions (typed response)?B. Correct Permissions: You received a trouble ticket indicating that the SLASH/data directory is no longer readable. Correct the permissions touser read/write/execute, group read/write, and world read. Perform an ls -la of the SLASH/data directory and take a screenshot of theoutput. Paste the screenshot here:C. Reading Log Files: You must check the last few lines of output of a few important log files. Tail the last 5 lines of the messages log file and thelast 5 lines of the secure log file. Screenshot the output from both tail commands. Paste the screenshot here:Work Verification: Take a screenshot (or multiple screenshots if needed) that captures the output of the pwd and history commands. Paste thesescreenshots here:R