Question: Cybersecurity Module 4 Challenge Submission File Linux Systems Administration Make a copy of this document to work in , and then for each step, add
Cybersecurity
Module Challenge Submission File
Linux Systems Administration
Make a copy of this document to work in and then for each step, add the solution commands below the prompt. Save and submit this completed file as your Challenge deliverable.
Step : EnsureDouble Check Permissions on Sensitive Files
Permissions on etcshadow should allow only root read and write access.
Command to inspect permissions:
Enter answer here
Command to set permissions if needed:
Enter answer here
Permissions on etcgshadow should allow only root read and write access.
Command to inspect permissions:
Enter answer here
Command to set permissions if needed:
Enter answer here
Permissions on etcgroup should allow root read and write access, and allow everyone else read access only.
Command to inspect permissions:
Enter answer here
Command to set permissions if needed:
Enter answer here
Permissions on etcpasswd should allow root read and write access, and allow everyone else read access only.
Command to inspect permissions:
Enter answer here
Command to set permissions if needed:
Enter answer here
Step : Create User Accounts
Add user accounts for sam, joe, amy, sara, and admin with the useradd command.
Command to add each user account include all five users:
Enter answer here
Ensure that only the admin has general sudo access.
Command to add admin to the sudo group:
Enter answer here
Step : Create User Group and Collaborative Folder
Add an engineers group to the system.
Command to add group:
Enter answer here
Add users sam, joe, amy, and sara to the managed group.
Command to add users to engineers group include all four users:
Enter answer here
Create a shared folder for this group at homeengineers
Command to create the shared folder:
Enter answer here
Change ownership on the new engineers shared folder to the engineers group.
Command to change ownership of engineers shared folder to engineers group:
Enter answer here
Step : Lynis Auditing
Command to install Lynis:
Enter answer here
Command to view documentation and instructions:
Enter answer here
Command to run an audit:
Enter answer here
Provide a report from the Lynis output with recommendations for hardening the system.
Screenshot of report output:
Optional Additional Challenge
Command to install chkrootkit:
Enter answer here
Command to view documentation and instructions:
Enter answer here
Command to run expert mode:
Enter answer here
Provide a report from the chrootkit output with recommendations for hardening the system.
Screenshot of end of sample output:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
