Wk 4 – Preparing Linux for a Security Assessment Lab [due Mon]

  
Assignment Content

   Large Data, Inc., is an international Internet Service Provider (ISP) based in the U.S. They have recently been a victim of an external denial of service (DoS) attack that caused a data breach. Large Data, Inc., hired your firm to perform an external network security assessment. Your first assignment is to help Large Data, Inc., by performing a security assessment to identify if they have any more weaknesses. You get ready for the onsite engagement by preparing your Linux system to use as the platform for the security assessment and penetration testing. To complete this task, you use Linux tools to prepare your system for the deployment.
The client has asked you to describe the filesystem you intend to use and detail the steps used to prepare the system for testing, as well as your approach to resolving issues you uncover.
Complete the following modules in the Practice Labs course “CompTIA Linux + LX0-103”: 

Don't use plagiarized sources. Get Your Custom Essay on
Wk 4 – Preparing Linux for a Security Assessment Lab [due Mon]
For as little as $15/Page
Order Essay

“Create Partitions and Filesystems”
“Control Mounting and Unmounting of Filesystems”
“Find System Files and Place Files in the Correct Location”
Note: The labs will help you set up your Linux system for the onsite engagement by creating partitions and filesystems, mounting and unmounting filesystems, and finding system files and placing files in the correct locations.
Capture screenshots after completing each command line step. Paste screenshots into a Word document.
Write a 1- to 2-page filesystem assessment to accompany the screenshots using Microsoft®Word that addresses the following: 

Accurately describe the purpose of creating system partitions
Accurately define what commands are needed to mount and unmount a filesystems
List three ways to find system files, and explain how to use the command line tools correctly
Fully describe two Linux commands you can use for resolving the issues you find, and explain why they are useful
Completely describe good troubleshooting practices, and explain how system performance monitoring is used during the troubleshooting process

Order your essay today and save 25% with the discount code: THANKYOU

Order a unique copy of this paper

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 25% with the discount code THANKYOU