Description
There are lab instructions for using a virtual machine that you don’t need to complete (I’ve done it already)… I just need the short essay questions answered. There are not really a set amount that needs to be written just as long as the questions are answered and correctly sourced. In the first document there are 2 questions with 1 conclusion, the second document has 4 questions and a conclusion totalling 8 questions total.
Module 04 Project ver 2.
`Overview: ………………………………………………………………………………………………………………………………….. 1
SMB Company Scenario ……………………………………………………………………………………………………………. 1
Resources: ………………………………………………………………………………………………………………………………….. 2
Process: ……………………………………………………………………………………………………………………………………… 2
System Management ……………………………………………………………………………………………………………….. 2
***Required Question 1: Kickstart …………………………………………………………………………………………….. 2
***Required Documentation: Script ………………………………………………………………………………………….. 3
***Required Question 2: Script …………………………………………………………………………………………………. 5
***Required Question 3: GRUB2 ……………………………………………………………………………………………….. 6
***Conclusion:……………………………………………………………………………………………………………………………. 7
References …………………………………………………………………………………………………………………………………. 8
Overview:
SMB Company Scenario
SMB Company is a new business that is evaluating different operating systems for their workstations. You are responsible with installing a version of Linux and performing basic configurations found in a business environment (users/groups, permissions, etc.). In this module, you will work on the following aspect of the operating system:
- 1. Module 04 Disk and File System Management, Hardware Installation
- Create a File permissions Planner Sheet. This includes the following file permissions and attributes for select user/device:
- i. Viewing permissions
- ii. Changing permissions iii. Changing ownership iv. Access Control Lists
- v. File attributes
- Extended attributes
Using the CentOS VM you created in Module 01 and continued working on in previous Modules, you will be asked to document specific points in the activities below to verify you have completed the tasks successfully. You will also be asked to answer various questions as part of the system analysis and design for SMB Company.
This document is serves as both the directions for the Module 04 Project and the submission for the Module
04 Project. Any other document is not acceptable and will have a negative impact on the Module 04 Project grade. In the Conclusion section, you will be asked to comment on your experiences during the activity.
Resources:
Utilize the Windows Snip tool to capture the requested screenshots and insert those screenshots where indicated. If you need assistance with using the Snip tool, please refer to this tutorial.
- If you are not using a Windows-based system, you will need to locate and use another screenshot tool.
Process:
System Management
- 1. Start your CentOS VM
- Enter the username and password to login to your system
- 2. Open a terminal and execute the following commands:
- su
- i. Login as root
- ls /var/log/anaconda
- i. What log files are present and what information do they contain?
- egrep -I “(error|warn)” /var/log/anaconda/*
- i. There may or not be any errors or warnings
- ls -F /proc
- i. View the contents of proc
- less /proc/cpuinfo
- i. Review details and type q when finished
- dmesg | less
- i. Observe the entries and type q when finished
- journalctl -b | less
- i. What are these entries?
- ii. Type q when finished
- 3. Leave your VM session open as you answer the following questio
***Required Question 1: Kickstart
After reviewing the installation files, you may have noticed something called kickstart. What is a kickstart installation and how could it prove useful when installing Linux on many systems?
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
- 4. Navigate back to your VM session, open a terminal, and complete the following tasks:
- touch sample1 sample2
- ls -l sample1 sample2 > file
- i. Captures the output and redirects it to a file called file
- cat file
- i. What are the contents and why?
- ls -l sample1 sample2 2> file
- i. What happened? Why?
- cat file
- i. What are the contents and why?
- ls -l sample1 sample2 > file 2> file2
- cat file
- cat file2
- i. What happened when you redirected standard output and standard error?
- ls -l sample1 sample2 > file 2> &1
- cat file
- i. What happened and why?
- ls -l sample1 sample2 > &2 2>file2
- cat file2
- i. What happened and why?
- date >> file
- cat file
- i. What happened and why?
- tr o O /etc/hosts
- i. What error did you receive and why?
- tr o O </etc/hosts
- i. What happened and why?
- cat /etc/nsswitch.conf | less
- i. Why use the pipe (|) with this command?
- cat /etc/nsswitch.conf | grep nisplus
- cat /etc/nsswitch.conf | grep nisplus | tr n N
- i. How did the pipes connect these commands?
- cat /etc/nsswitch.conf | grep nisplus | tr n N | sort -r | tee file
- i. What happened to the output?
- vim myscript
- i. Enter the following in this text file (remember to use appropriate vim commands)
#!/bin/bash
echo -e “This is a sample shell script. \t It displays mounted filesystems \a”
mount
- ii. Save and quit the editor after entering the lines above.
- bash myscript
- i. Did your script execute?
- chmod u+x myscript
- ./myscript
- i. Did the script execute?
- 5. Leave your VM session open as you capture the required documentation below
***Required Documentation: Script
Capture a screenshot of the script you just executed and insert the screenshot in the field below:
- 6. Navigate back to your VM session, open a terminal, and complete the following tasks:
- vim myscript2
- i. Enter the following in this text file (remember to use appropriate vim commands):
#!/bin/bash
echo -e “This program adds entries to a family database file.\n”
echo -e “Please enter the name of the family member –>\c”
read NAME
echo -e “Please enter the family member’s relation to you (i.e.
mother) –>\c”
read RELATION
echo -e “Please enter the family member’s telephone number –>\c”
read PHONE
echo -e “$NAME\t$RELATION\t$PHONE” >> database
- ii. Save and quit the editor after entering the lines above.
- chmod u+x myscript2
- ./myscript2
- i. Answer the questions as they appear
- ii. Repeat this step at least 3 times with different information to populate the database
- cat database
- i. Did the script capture the information you provided?
- vim myscript2
- i. Make the necessary edits to the file:
#!/bin/bash
echo -e “Would you like to add an entry to the family database file?\n”
read ANSWER1
if [ $ANSWER1 = “y” -o $ANSWER1 = “Y”]
then
echo -e “Please enter the name of the family member –>\c”
read NAME
echo -e “Please enter the family member’s relation to you (i.e. mother) —
>\c”
read RELATION
echo -e “Please enter the family member’s telephone number –>\c”
read PHONE
echo -e “$NAME\t$RELATION\t$PHONE” >> database
fi
echo -e “Would you like to search an entry in the family database file?\n”
read ANSWER2
if [ $ANSWER2 = “y” -o $ANSWER2 = “Y”]
then
echo -e “What word would you like to look for? –>\c”
read WORD
grep “$WORD” database
fi
- ii. Save and quit the editor after entering the lines above.
- ./myscript2
- i. Follow the prompts to test your new script
- vim myscript2
- i. Make the necessary edits to the file:
#!/bin/bash
echo -e “What would you like to do? Add an entry (a)
Search an entry (s)
Enter your choice –>\c”
read ANSWER
case $ANSWER in
a|A) echo -e “Please enter the name of the family member –>\c”
read NAME
echo -e “Please enter the family member’s relation to you (i.e.
mother) –>\c”
read RELATION
echo -e “Please enter the family member’s telephone number –>\c”
read PHONE
echo -e “$NAME\t$RELATION\t$PHONE” >> database
;;
s|S) echo -e “What word would you like to look for? –>\c”
read WORD
grep “$WORD” database
;;
*) echo “You must enter either the letter a or s.”
;;
esac
- ii. Save and quit the editor after entering the lines above.
- ./myscript2
- i. Follow the prompts to test your script
- ii. How does this version of the script differ from the others?
- 7. Leave your VM session open as you answer the following questio
***Required Question 2: Script
SMB Company wants to gather system configuration information. Create a bash script that will provide information about each of the items listed below.
NOTE: You must create a script file and not just type each command at the prompt:
- Currently logged user
- Current shell
- Home directory
- Operating system type
- Current path setting
- Current working directory
- Currently logged number of users
- Show computer cpu information like processor type, speed etc
- Show memory information
- Show hard disk information like size of hard-disk, cache memory, model etc
- File system (Mounted)
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
- 8. Navigate back to your VM session, open a terminal (if required), and complete the following tasks.
- less /boot/grub2/grub.cfg
- i. What is the primary purpose of this file?
- vim /etc/default/grub
- i. Use the appropriate text editor commands to make the following change: Set the value of GRUB_TIMEOUT to 30
- ii. Save and quit the vim text editor
- grub2-mkconfig -o /boot/grub2/grub.cfg
- reboot
- 9. When the GRUB bootloader appears, press c to obtain a command prompt
- Your prompt should change to grub>. Enter the following commands:
- i. help
- ii. lspci
iii. list_env
- What did these commands show you?
- reboot
- Your system will reboot
- 10. When the GRUB bootloader appears, press e to edit the configuration
- Find the line that starts with linux and navigate to the end of it (should end with rhgb quiet)
- After the word quiet, type single and press F10 to boot the system i. What did each of these commands accomplish?
- 11. Reboot your system one more time so that it reverts to its default runlevel/target. Login as root.
- 12. Leave your VM session open as you answer the following questio
***Required Question 3: GRUB2
The GRUB menu can be password-protected. Why would a Linux administrator choose to implement this security mechanism?
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font
adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
- 13. Navigate back to your VM session, open a terminal (if required), and complete the following tasks.
- runlevel
- i. What is your current runlevel?
- cat /etc/inittab
- i. What is the importance of this file?
- ls /usr/lib/systemd/system
- i. What do the contents represent?
- ls /etc/rc/.d
- i. Do you see init.d and rc[runlevel].d subdirectories? Why?
- chkconfig –list netconsole
- i. In which runlevels is netconsole started by default?
- chkconfig –level 23 netconsole on
- i. What change did this make?
- init 3
- runlevel
- i. What is the current and most recent runlevel?
- systemctl isolate graphical.target j. systemctl -a | grep crond.service k. systemctl restart crond.service
- systemctl disable crond.service m. systemctl enable crond.service n. service netconsole start
- i. What did these previous commands accomplish?
- system-config-keyboard
- i. View the available keyboard options and click Cancel when finished
- 15. You can close the terminal and shut down the
***Conclusion:
SMB Company is going to have a variety of users that serve different roles and have different responsibilities. In the TestOut activity, you interacted with various filesystem permissions, access control lists (ACLs), and other attributes. You are responsible for creating a file permissions plan that will control access to various system resources. First, define and describe the different types of employee roles for SMB Company. For example, management vs. non-management, system administrators vs. non-administrators, internal employees vs. external entities (contractors, temporary workers, interns, etc.). Next, define and describe the different types of departments SMB Company has. For example, human resources, accounting, IT, payroll, etc. Finally, define the different types of permissions each role and group will have. For example, non- management employees in the Human Resources group can create resources in the Human Resources directory.
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
References
Utilize the Rich Text field below for your References. Follow APA standards.
Click or tap here to enter text.
Module 03 Project ver 1.1
Overview: …………………………………………………………………………………………………………………………………… 1
SMB Company Scenario ……………………………………………………………………………………………………………. 1
Resources: ………………………………………………………………………………………………………………………………….. 1
Process: ……………………………………………………………………………………………………………………………………… 2
Software Installation ………………………………………………………………………………………………………………… 2
***Required Question 1: Log Management ………………………………………………………………………………… 2
***Required Question 2: User and Group Management ………………………………………………………………. 3
***Conclusion:……………………………………………………………………………………………………………………………. 4
References …………………………………………………………………………………………………………………………………. 5
Overview:
SMB Company Scenario
SMB Company is a new business that is evaluating different operating systems for their workstations. You are responsible with installing a version of Linux and performing basic configurations found in a business environment (users/groups, permissions, etc.). In this module, you will work on the following aspect of the operating system:
- 1. Module 03 Software Installation, Users and Groups
- Create User and Device Planner Sheet. This includes: Manage Users and Groups, Hardware
Installations, Software Installations.
Using the CentOS VM you created in Module 01 and continued working on in Module 02, you will be asked to document specific points in the activities below to verify you have completed the tasks successfully. You will also be asked to answer various questions as part of the system analysis and design for SMB Company.
This document is serves as both the directions for the Module 03 Project and the submission for the Module
03 Project. Any other document is not acceptable and will have a negative impact on the Module 03 Project grade. In the Conclusion section, you will be asked to comment on your experiences during the activity.
Resources:
Utilize the Windows Snip tool to capture the requested screenshots and insert those screenshots where indicated. If you need assistance with using the Snip tool, please refer to this tutorial.
- If you are not using a Windows-based system, you will need to locate and use another screenshot tool.
Process:
Software Installation
- 1. Start your CentOS VM
- Enter the username and password to login to your system
- 2. Open a terminal and execute the following commands:
- su
- i. Login as root
- lpadmin -p printer1 -E -v /dev/null -m raw
- i. Creates a sample printer
- lpoptions -d printer1
- i. Ensures printer1 is the default printer
- cat /etc/cups/printers.conf
- i. Do you see an entry to print to /dev/null
- lpstat -t
- i. Are the daemons and printer running?
- cupsdisable -r “To keep print jobs in the queue” printer1
- i. Disables the printer with a reason
- lp -n 2 /etc/inittab
- i. Prints 2 copies of this file to printer1
- lp /etc/hosts /etc/nsswitch.conf
- i. Starts 2 print jobs
- mount | lp
- lpstat
- i. Are your print jobs in the queue?
- ls /var/spool/cups
- i. Do you see your print jobs?
- lpq
- lprm JobID
- i. Use the lpq command to get all the print job IDs ii. Use lprm and replace JobID with the print job IDs iii. Repeat the command until all jobs are removed
- ls -l /dev/log
- i. What daemon uses this file and what is its purpose?
- cat /etc/systemd/journald.conf
- i. What line could you configure to set a maximum size for the journald database?
- journalctl _COMM=gdm
- i. View log entries from the GNOME display manager
- ls /var/log
- ls /var/log/cups
- i. View the entries
- cat /etc/logrotate.d/cups
- i. How many copies of old log files are kept for the log files in this directory?
- 3. Leave your VM session open as you answer the following questio
***Required Question 1: Log Management
Why is it important to routinely view log files?
Why is it important to ensure that log files do not consume excessive amounts of storage?
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
- 4. Navigate back to your VM session, open a terminal, and complete the following tasks related to user administration:
- less /etc/passwd
- ls -l /etc/passwd c. less /etc/shadow d. ls -l /etc/shadow e. pwconv
- i. What does this command do?
- cat /etc/default/useradd
- i. What is the default shell for new users?
- ii. What is the default location of the skel directory?
iii. Where are home directories created by default?
- ls -a /etc/skel
- i. What is the purpose of this file?
- useradd -m bozo
- cat /etc/passwd
- i. View the information for bozo
- cat /etc/shadow
- i. Is there an entry for bozo?
- passwd bozo
- i. Use password for bozo’s password
- usermod -l bozo2 bozo
- i. What was changed for bozo?
- usermod -l bozo bozo2
- usermod -u 666 bozo
- usermod -f 14 bozo
- usermod -e “01/01/2025” bozo
- chage -m 2 bozo r. chage -M 40 bozo s. chage -W 5 bozo
- i. View /etc/passwd and /etc/shadow to determine what was changed for bozo
- passwd -l bozo
- cat /etc/shadow
- i. What happened to bozo’s password?
- passwd -u bozo
- groupadd bozoettes
- usermod -a -G bozoettes bozo
- i. Adds bozo to the bozoettes group
- userdel bozo
***Required Question 2: User and Group Management
Why is user (group) password information stored in separate files from the user’s other information?
Explain the purpose of each file where the user (group) password information is stored.
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
- 1. Navigate back to your VM session, open a terminal, and complete the following tasks:
- yum install ncompress
- cp /etc/services ~
- i. Make a backup copy of this file c. compress -v services
- ls -l
- i. Did the compress get created? How can you tell?
- uncompress -v services.Z
- i. Decompresses the file f. ps -ef | compress -v >psfile.Z
- i. What did this accomplish?
- g. yum groupinstall “Development Tools”
- i. What packages were installed?
- 15. You can close the terminal and shut down the VM.
***Conclusion:
SMB Company is going to have a variety of users and groups in their environment and require different pieces of software to accomplish their daily tasks. In the field below,
- Create an initial list of users and groups you will create on the system.
Include a description of each user/group that includes their role in the organization and their work responsibilities.
- List the commands to create users and groups. Give example of command syntax.
Alternatively, explain in details the procedure for creating users or groups using a graphical utility.
- Next, identify several applications that you will install for SMB Company. For each application, describe what the application is, how it is installed, and some of the configurations you will make to it.
Utilize the Rich Text field below for your answer. In the field, you can incorporate section headers, font adjustments, screenshots, etc. If you use any source material, use in-text citations, per APA standards, and ensure the sources are included in References section at the end of this document.
Click or tap here to enter text.
References
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
NOTE: Make sure to support all your statements and conclusions with valid research. At least 2 external references are required in the correct APA format. Personal experience is not a substitute for research and cannot be used as a reference. Verify that your submission is spellchecked and proofread.
For APA guidelines go to Resources tab located in the top right corner of the Course Home.
- How User Information is Stored on Your System. (n.d.). Retrieved July 29, 2020, from https://tldp.org/HOWTO/User-Authentication-HOWTO/x71.html
Admin. (n.d.). OS. Retrieved July 29, 2020, from https://www.thegeekdiary.com/beginners-guide-to-user-and-group-administration-in-linux/
Cordray, R. (n.d.). Why log management is absolutely critical for IT security. Retrieved July 29, 2020, from https://www.itworldcanada.com/blog/why-log-management-is-absolutely-critical-for-it-security/377711
Event Log Management for Security and Compliance. (n.d.). Retrieved July 29, 2020, from https://www.whatsupgold.com/best-practices/event-log-management
The Importance of Log Management. (n.d.). Retrieved July 29, 2020, from https://www.securitymetrics.com/blog/importance-log-management
Person. (2019, March 18). Unix & Linux Security – Why is Log Integrity so Important? Retrieved July 29, 2020, from https://www.beyondtrust.com/blog/entry/unix-linux-security-log-integrity-important
Songyysongyy 16111 gold badge11 silver badge44 bronze badges, Nathan WilsonNathan Wilson 24311 silver badge44 bronze badges, & Dakkadakka 71144 silver badges1111 bronze badges. (1965, January 01). Where & How is user group information stored in Ubuntu? Retrieved July 29, 2020, from https://unix.stackexchange.com/questions/217300/where-how-is-user-group-information-stored-in-ubuntu