Assignment
Last updated
Last updated
Here’s a table of specific assignments for each chapter covered, asking learners to perform specific tasks and providing criteria for checking their answers. Each assignment is aligned with the topics discussed in the previous chapters, allowing learners to apply their knowledge practically.
1
Linux Overview
Research and list five key features of Linux.
Must include details about features like open-source, multi-user, etc.
2
Linux Kernel
Explain the role of the kernel in Linux. Provide an example of how a kernel module can be loaded.
Should include a clear explanation and an example using modprobe
.
3
Linux Distros
Compare two Linux distributions (e.g., Ubuntu vs. Fedora) and list their use cases.
Must include at least three differences and specific use cases.
4
Kali Linux
Download the prebuilt Kali Linux VM image and run it on VirtualBox.
Verify that the VM is successfully running and accessible.
5
Kali Linux
Install additional tools using apt
on Kali Linux.
Must demonstrate successful installation of at least two tools.
6
Linux Commands
Navigate the filesystem using commands and create a directory structure with files.
Should include mkdir
, cd
, and ls
commands with a screenshot.
7
File Permissions
Change the permissions of a file using both numeric and symbolic methods.
Should show commands and the final permissions with ls -l
.
8
File Permissions
Create a script that sets specific permissions for a set of files in a directory.
The script must run successfully and show correct permissions.
9
Disk Utility Tools
Create and format a new partition on a virtual disk.
Must include steps taken and a final df
output showing the new partition.
10
Mounting and Unmounting
Mount a USB drive and create a file on it, then unmount it.
Must show the mounted directory and confirmation of unmounting.
11
System Commands
Write a script to collect system information (CPU, RAM) and log it.
The output file should contain correct and formatted data.
12
Process Management
Identify and kill a running process based on its name.
Must show the process ID and the command used to terminate it.
13
Networking Tools
Use ping
to test connectivity to a website and document the results.
Should include command output and an analysis of connectivity.
14
Networking Tools
Configure a static IP address using ifconfig
or ip
.
Must show the command used and the new network configuration.
15
Text Processing Tools
Use grep
to search for specific patterns in a log file and report occurrences.
The output must include the pattern and a count of occurrences.
16
Text Processing Tools
Create a pipeline with awk
to extract specific columns from a CSV file.
The output must be correctly formatted and relevant.
17
Text Processing Tools
Use sed
to perform a find-and-replace operation in a text file.
Show the command and the final content of the modified file.
18
Package Management
Install a software package using apt
and document the installation steps.
Should show commands used and the successful installation message.
19
Package Management
Update the package list and upgrade all installed packages.
Must show the output of the commands and verify upgraded packages.
20
Networking
Analyze a network issue using dig
to check DNS resolution for a domain.
Must include command output and a summary of findings.
21
Disk Usage Analysis
Use du
and df
to analyze disk usage and report the results.
Should include a detailed summary of disk usage in a report format.
22
Backup and Recovery
Create a backup of a directory using tar
and restore it.
Must show the commands used and confirmation of restored files.
23
User Management
Create a new user and set permissions using usermod
.
Show the command used and the final user permissions.
24
Group Management
Create a group and add users to it, then verify membership.
Must show commands used and the output of groups
for verification.
25
Access Control
Configure sudoers
to allow a user to run specific commands.
Show changes made to sudoers
and verify functionality.
26
Log Analysis
Analyze system logs for specific events and summarize findings.
The report must detail findings and commands used for analysis.
27
Shell Scripting
Write a shell script that accepts user input to create a directory.
The script must run successfully and show correct directory creation.
28
Environment Variables
Create and modify environment variables in a script.
Must demonstrate changes with echo $VARIABLE
outputs.
29
Kernel Management
List currently loaded kernel modules and unload a specific module.
Should include commands and verification of changes.
30
System Security
Simulate a security breach by analyzing logs for suspicious activity.
The report must include findings and recommended actions.
31
Network Monitoring
Capture network packets using tcpdump
and analyze the traffic.
Include the command output and a summary of the packet types captured.
32
Performance Tuning
Analyze system performance metrics and recommend optimizations.
Must include specific metrics analyzed and proposed changes.
33
Disk Cleanup
Develop a cleanup strategy using commands to remove temporary files.
The report should detail files removed and space saved.
34
Data Recovery
Simulate a data loss scenario and recover deleted files.
Must demonstrate the recovery process and files restored.
35
Application Deployment
Deploy a sample web application using Docker.
Must show successful deployment and access to the application.
36
Backup and Restore
Schedule a cron job for regular backups of a specific directory.
Must show the cron job and verify backup execution.
37
Change Management
Document a change management process for updating software in a production environment.
The document must detail the steps taken and approvals needed.
38
User Permissions
Create a scenario managing user permissions for a shared directory.
Must demonstrate correct permissions with ls -l
.
39
Environment Setup
Set up a development environment with Docker for a sample application.
Show Docker containers running and accessible applications.
40
Security Hardening
Implement basic security measures on Kali Linux and document the changes.
The report must include specific measures taken and their impacts.
41
Backup and Recovery
Use rsync
to back up files from one directory to another.
Must demonstrate correct usage and verify files in the backup.
42
User Management
Automate the creation of multiple users with specified configurations using a script.
The script must run successfully, creating the specified users.
43
Service Management
Use systemctl
to start, stop, and check the status of a service.
Include commands used and the status before and after changes.
44
Log Analysis
Create a script that parses logs for failed login attempts and summarizes the results.
The output must detail findings and the script's functionality.
45
Network Configuration
Configure a virtual network using ip
commands and verify connectivity.
Include commands and confirmation of network connectivity.
46
Package Management
Remove unnecessary packages and clean up the package cache using apt
.
Must show commands and the result of apt autoremove
.
47
System Security
Implement user-level security by configuring iptables
rules and testing their effectiveness.
Must demonstrate rules set and results of testing access.
48
Environment Variables
Create a shell script that sets environment variables for a specific application.
Must show the script and the effect of running it on the application.
49
Kernel Management
Write a report on the current kernel version and suggest potential updates.
The report must include kernel details and suggested changes.
50
Disk Utility Tools
Create a report on disk health using smartctl
and interpret the results.
Must include smartctl
output and an analysis of disk health.