Search for question
Question

Overview These labs represent tasks that a network administrator will routinely perform. It is extremely important for a practitioner to have skills in these areas to inform security policy and procedures. Prompt Complete the Module Four Lab Worksheet, which is linked in the Lab Worksheet assignment in Module Four of your course. In the worksheet, you will respond to prompts related to these labs: • Working With Files • Permissions, Users, and Groups in Linux Log Analysis What to Submit Submit your completed worksheet. Use a file name that includes the course code, the assignment title, and your name-for example, CYB_100_Project_One_Neo_Anderson.docx. Module Four Lab Worksheet Rubric Criteria Working With Files: Screenshot 1 Working With Files: Screenshot 2 Working With Files: Short Response Permissions, Users, and Groups in Linux: Screenshot 1 Permissions, Users, and Groups in Linux: Screenshot 2 Permissions, Users, and Groups in Linux: Short Response Proficient (100%) Provides screenshot of the output of "Using Chmod to Change Permissions," Step 3 Provides screenshot of the output of "Setting Special Permissions," Step 13 Describes how the sticky bit can be used to implement least privilege and assure file availability Provides screenshot of the cat etc/passwd command with the student as the new user Provides screenshot of the output of "Absolute Permission," Step 18 Provides a command for the proper permission settings for each of the three requirements Needs Improvement (70%) N/A N/A Addresses "Proficient" criteria, but there are gaps in clarity, logic, or detail N/A N/A Addresses "Proficient" criteria, but there are gaps in clarity, logic, or detail Not Evident (0%) Does not address critical element, or response is irrelevant Does not address critical element, or response is irrelevant Does not address critical element, or response is irrelevant Does not address critical element, or response is irrelevant Does not address critical element, or response is irrelevant Does not address critical element, or response is irrelevant Log Analysis: Screenshot 1 Provides screenshot of the output of "Examining Windows Event Logs, IIs Logs, and N/A Scheduled Tasks," Step 23 Does not address critical element, or response is irrelevant Criteria Log Analysis: Screenshot 2 Log Analysis: Short Response Articulation of Response Proficient (100%) Needs Improvement (70%) Provides screenshot of the output of "Examining Linux Log Files," Step 38 Describes the importance of maintaining clean log files that are well formatted Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format N/A Addresses "Proficient" criteria, but there are gaps in clarity, logic, or detail Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas Not Evident (0%) Does not address critical element, or response is irrelevant Does not address critical element, or response is irrelevant Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas Total