Answered step by step
Verified Expert Solution
Question
1 Approved Answer
1 . Check log messages from the systemd journal for the following services: NetworkManager.service, sshd . service, and auditd.service. { Screen capture } 2 .
Check log messages from the systemd journal for the following services: NetworkManager.service, sshdservice, and auditd.service. Screen capture
List the permissions of the file containing your system's user passwords, and determine if they are appropriate. Enter the command used
Determine your account's password aging and if it will expire using a single command. Enter the command used
Start auditing writes to the etcshadow with the auditd daemon, and then check your audit settings. Screen capture
Create a report from the auditd daemon on the etcshadow file, and then turn off auditing on that file. Screen capture
Install the lemon package, damage the usrbinlemon file perhaps copy etcservices there verify that the file has been tampered with, and remove the lemon package. Screen capture
You suspect you have had a malicious attack on your system today and important binary files have been modified. What command should you use to find these modified files? Screen capture
Install and run chkrootkit to see if the malicious attack from # above installed a rootkit. Screen capture
Find files with the SetUID or SetGID permission set. Enter the command used
Install the aide package, run the aide command to initialize the aide database, copy the database to the correct location, and run the aide command to check if any important files on your system have been modified. Screen capture
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started