review the prompt and grading rubric in theModule Four Lab Worksheet Guidelines and Rubric PDFdocument. Next, read theModule Four Lab Worksheet Word Documentso you will be prepared to take specific screenshots as you work through the labs.
You will need to access the labs in theInfoSecenvironment:
CYB 230 Module Four Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Working With Files Prompt Response In the lab section “Using Chmod to Change Permissions,” Step 3, insert your name at the command line below the output and include it in your screenshot. [Insert screenshot.] In the lab section “Setting Special Permissions,” Step 13, insert your name at the command line below the output and include it in your screenshot. [Insert screenshot.] Implementing the sticky bit on the directory can stop people from accidentally deleting files that they don’t own. How can this technique be used to implement the concept of least privilege, and how can it be used to assure file availability? [Insert short response.] Lab: Permissions, Users, and Groups in Linux Prompt Response After completing the lab section “Adding Groups, Users, and Passwords,” repeat Steps 9 through 15 and add another user using your first name. Provide a screenshot of the cat etc/passwd command when you are done. [Insert screenshot.] After completing the lab section “Absolute Permission,” repeat the process using your first name as the text file. Provide a screenshot after Step 18. Note: By default, some computer systems use the key sequence Ctrl+Alt+F1 to access a shortcut for other programs such as the Intel Graphics Control Panel. If this is the case, you will need to change the key sequence from the default to complete this step. To exit the tty1 or tty2 window, use the key sequence Ctrl+Alt+F7. [Insert screenshot.] Using the chmod command, which commands would you use to set the following permissions to a file called Answers.txt? (Please provide the one line used at the command line for each bulleted item.) · User (read and write), group (execute) other (execute) · User (read, write, execute), group (read and execute) other (write and execute) · User (write), group (read) other (none) [Insert short response.] Lab: Log Analysis Prompt Response In the lab section “Examining Windows Event Logs, IIs Logs, and Scheduled Tasks,” Step 23, add your name as the top line of the file and then take a screenshot. [Insert screenshot.] In the lab section “Examining Linux Log Files,” Step 38, insert your name at the command line below the output and include it in your screenshot. [Insert screenshot.] What is the importance of maintaining clean log files that are well formatted? [Insert short response.] CYB 230 Module Four Lab Worksheet Guidelines and Rubric CYB 230 Module Four Lab Worksheet Guidelines and Rubric Overview These labs represent tasks that a network administrator will routinely perform. It is extremely important for a practitioner to have skills in these areas to inform security policy and procedures. Prompt Complete the Module Four Lab Worksheet, which is linked in the Lab Worksheet assignment in Module Four of your course. In the worksheet, you will respond to prompts related to these labs: Working With Files Permissions, Users, and Groups in Linux Log Analysis Rubric Guidelines for Submission: Submit your completed worksheet. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx. Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value Working With Files: Screenshot 1 Provides screenshot of the output of “Using Chmod to Change Permissions,” Step 3 Does not address critical element, or response is irrelevant 10 Working With Files: Screenshot 2 Provides screenshot of the output of “Setting Special Permissions,” Step 13 Does not address critical element, or response is irrelevant 10 Working With Files: Short Response Describes how the sticky bit can be used to implement least privilege and assure file availability Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Permissions, Users, and Groups in Linux: Screenshot 1 Provides screenshot of the cat etc/passwd command with the student as the new user Does not address critical element, or response is irrelevant 10 Permissions, Users, and Groups in Linux: Screenshot 2 Provides screenshot of the output of “Absolute Permission,” Step 18 Does not address critical element, or response is irrelevant 10 Critical Elements Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value Permissions, Users, and Groups in Linux: Short Response Provides a command for the proper permission settings for each of the three requirements Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Log Analysis: Screenshot 1 Provides screenshot of the output of “Examining Windows Event Logs, IIs Logs, and Scheduled Tasks,” Step 23 Does not address critical element, or response is irrelevant 10 Log Analysis: Screenshot 2 Provides screenshot of the output of “Examining Linux Log Files,” Step 38 Does not address critical element, or response is irrelevant 10 Log Analysis: Short Response Describes the importance of maintaining clean log files that are well formatted Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 10 Articulation of Response Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas 10 Total 100%