Question: 1 . Check log messages from the systemd journal for the following services: NetworkManager.service, sshd . service, and auditd.service. { Screen capture } 2 .
Check log messages from the systemd journal for the following services: NetworkManager.service, sshdservice, and auditd.service. Screen capture
List the permissions of the file containing your system's user passwords, and determine if they are appropriate. Enter the command used
Determine your account's password aging and if it will expire using a single command. Enter the command used
Start auditing writes to the etcshadow with the auditd daemon, and then check your audit settings. Screen capture
Create a report from the auditd daemon on the etcshadow file, and then turn off auditing on that file. Screen capture
Install the lemon package, damage the usrbinlemon file perhaps copy etcservices there verify that the file has been tampered with, and remove the lemon package. Screen capture
You suspect you have had a malicious attack on your system today and important binary files have been modified. What command should you use to find these modified files? Screen capture
Install and run chkrootkit to see if the malicious attack from # above installed a rootkit. Screen capture
Find files with the SetUID or SetGID permission set. Enter the command used
Install the aide package, run the aide command to initialize the aide database, copy the database to the correct location, and run the aide command to check if any important files on your system have been modified. Screen capture
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
