Question Details

[answered] LINUX. Not necessarily asking for the screenshots, but if y


LINUX. Not necessarily asking for the screenshots, but if you can provide them, great. I pretty much need a rundown of how to find the issues listed in the question. I'm using webminal as the Linux simulator.


Employee 1 (Bob): Contacted by the Information Assurance (IA) Department and informed that his account is in violation of company policy and that his password is visible in plain-text. His account was locked.

Incorrect configuration (screenshot):

Error message in log (screenshot):

Corrective actions (typed response)?


Employee 2 (Frank): Unable to log into his UNIX account. He receives the error message ?su: failed to execute /dev/null: Permission denied.?

Incorrect configuration (screenshot):


Error message in log (screenshot):


Corrective actions (typed response)?


Employee 3 (Henry): Reports that he receives the following error message when he logs into his UNIX account: ?warning: cannot change directory to /home/henry: Permission denied? followed by the error ?-bash: /home/henry/.bash_profile: Permission denied?. Oddly, his command prompt is different from what he usually sees as well.

What is wrong (typed response)?

Corrective actions (typed response)?

Correct Permissions: You received a trouble ticket indicating that the SLASH/data directory is no longer readable. Correct the permissions to user read/write/execute, group read/write, and world read. Perform ?an ls -la of the SLASH/data directory and take a screenshot of the output. Paste the screenshot here:

Reading Log Files: You must check the last few lines of output of a few important log files. Tail the last 5 lines of the messages log file and the last 5 lines of the secure log file. Screenshot the output from both tail commands. Paste the screenshot here:

 


Solution details:
STATUS
Answered
QUALITY
Approved
ANSWER RATING

This question was answered on: Sep 18, 2020

PRICE: $15

Solution~0001013234.zip (25.37 KB)

Buy this answer for only: $15

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy from our tutoring website www.aceyourhomework.com (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Sep 18, 2020

EXPERT

Tutor

ANSWER RATING

GET INSTANT HELP/h4>

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN YOUR SET DEADLINE.

Order Now