{"id":405,"date":"2025-03-03T18:54:40","date_gmt":"2025-03-03T18:54:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?p=405"},"modified":"2025-03-03T18:54:43","modified_gmt":"2025-03-03T18:54:43","slug":"assignment-lab4","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/03\/assignment-lab4\/","title":{"rendered":"Assignment Lab4"},"content":{"rendered":"\n<p>CYSE 270: Linux System for Cybersecurity<br>Assignment: Lab 4<br>\u2013<br>Group and User Accounts<\/p>\n\n\n\n<p>Task A \u2013User Account management (8 * 5 =40 points)<\/p>\n\n\n\n<p>Open a terminal window in VM and execute the correct command to display the user account<br>information (including the login shell and home directory) for the current user using grep.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"524\" height=\"74\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1.jpg\" alt=\"\" class=\"wp-image-406\" style=\"width:580px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1.jpg 524w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-300x42.jpg 300w\" sizes=\"(max-width: 524px) 100vw, 524px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>2. Execute the correct command to display user password information (including the encrypted<br>password and password aging) for the current user using grep.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"811\" height=\"111\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-1.jpg\" alt=\"\" class=\"wp-image-407\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-1.jpg 811w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-1-300x41.jpg 300w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-1-768x105.jpg 768w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-1-750x103.jpg 750w\" sizes=\"(max-width: 811px) 100vw, 811px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>3. Create a new user named xxxxx and explicitly use options to create the home directory\/home\/<br>Xxxxx for this user<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"239\" height=\"44\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-1-3.jpg\" alt=\"\" class=\"wp-image-409\" style=\"width:439px;height:auto\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>4. Set a password for the new user.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"324\" height=\"101\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2.jpg\" alt=\"\" class=\"wp-image-410\" style=\"width:338px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2.jpg 324w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-300x94.jpg 300w\" sizes=\"(max-width: 324px) 100vw, 324px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>5. Set bash shell as the default login shell for the new user xxxxx, then verify the change<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"352\" height=\"47\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-1.jpg\" alt=\"\" class=\"wp-image-411\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-1.jpg 352w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-1-300x40.jpg 300w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"851\" height=\"200\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-2.jpg\" alt=\"\" class=\"wp-image-412\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-2.jpg 851w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-2-300x71.jpg 300w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-2-768x180.jpg 768w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-2-750x176.jpg 750w\" sizes=\"(max-width: 851px) 100vw, 851px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>6. Execute the correct command to display user password information (including the encrypted<br>password and password aging) for the new user xxxxx using grep.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"816\" height=\"60\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-3.jpg\" alt=\"\" class=\"wp-image-413\" style=\"width:840px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-3.jpg 816w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-3-300x22.jpg 300w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-3-768x56.jpg 768w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-3-750x55.jpg 750w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>7. Add the new user xxxxx to the sudo group without overriding the existing group membership<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-4.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"534\" height=\"174\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-4.jpg\" alt=\"\" class=\"wp-image-414\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-4.jpg 534w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-4-300x98.jpg 300w\" sizes=\"(max-width: 534px) 100vw, 534px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>8. Switch to the new user\u2019s account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-5.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"326\" height=\"88\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-5.jpg\" alt=\"\" class=\"wp-image-415\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-5.jpg 326w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-2-5-300x81.jpg 300w\" sizes=\"(max-width: 326px) 100vw, 326px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Task B\u2013 Group account management (12 * 5 =60 points)<\/p>\n\n\n\n<p>Return to your home directory and determine the shell you are using.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"269\" height=\"107\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3.jpg\" alt=\"\" class=\"wp-image-416\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Display the current user\u2019s ID and group membership<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"490\" height=\"65\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-1.jpg\" alt=\"\" class=\"wp-image-417\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-1.jpg 490w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-1-300x40.jpg 300w\" sizes=\"(max-width: 490px) 100vw, 490px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Display the group membership of the root account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"236\" height=\"57\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-2.jpg\" alt=\"\" class=\"wp-image-418\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Run the correct command to determine the user owner and group owner of the \/etc\/group file<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"438\" height=\"58\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-3.jpg\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-3.jpg 438w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-3-300x40.jpg 300w\" sizes=\"(max-width: 438px) 100vw, 438px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Create a new group named test and use your UIN as the GID.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-4.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"307\" height=\"136\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-4.jpg\" alt=\"\" class=\"wp-image-420\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-4.jpg 307w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-4-300x133.jpg 300w\" sizes=\"(max-width: 307px) 100vw, 307px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Display the group account information for the test group using grep<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-5.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"276\" height=\"70\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-5.jpg\" alt=\"\" class=\"wp-image-421\" style=\"width:328px;height:auto\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Change the group name of the test group to newtest<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-6.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"321\" height=\"46\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-6.jpg\" alt=\"\" class=\"wp-image-422\" style=\"width:426px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-6.jpg 321w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-3-6-300x43.jpg 300w\" sizes=\"(max-width: 321px) 100vw, 321px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>8. Add the current account (xxxxx) as a secondary member of the newtest group without overriding this user\u2019s current group membership.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"331\" height=\"89\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4.jpg\" alt=\"\" class=\"wp-image-423\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4.jpg 331w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-300x81.jpg 300w\" sizes=\"(max-width: 331px) 100vw, 331px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"63\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-1.jpg\" alt=\"\" class=\"wp-image-424\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-1.jpg 626w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-1-300x30.jpg 300w\" sizes=\"(max-width: 626px) 100vw, 626px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<ol start=\"9\">\n<li>Create a new file testfile in the account\u2019s home directory, then change the group owner to<br>newtest<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"246\" height=\"47\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-2.jpg\" alt=\"\" class=\"wp-image-425\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-3.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"322\" height=\"48\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-3.jpg\" alt=\"\" class=\"wp-image-426\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-3.jpg 322w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-3-300x45.jpg 300w\" sizes=\"(max-width: 322px) 100vw, 322px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>10. Display the user owner and group owner information of the file testfile<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-4.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"454\" height=\"65\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-4.jpg\" alt=\"\" class=\"wp-image-427\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-4.jpg 454w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-4-300x43.jpg 300w\" sizes=\"(max-width: 454px) 100vw, 454px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>11. Delete the newtest group, then repeat the previous step. What do you find?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-5.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"224\" height=\"91\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-5.jpg\" alt=\"\" class=\"wp-image-428\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-6.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"459\" height=\"63\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-6.jpg\" alt=\"\" class=\"wp-image-429\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-6.jpg 459w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-6-300x41.jpg 300w\" sizes=\"(max-width: 459px) 100vw, 459px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>12. Delete the user xxxxx along with the home directory using a single command<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-7.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"143\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-7.jpg\" alt=\"\" class=\"wp-image-430\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-7.jpg 450w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-7-300x95.jpg 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-9.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"202\" src=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-9.jpg\" alt=\"\" class=\"wp-image-432\" srcset=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-9.jpg 842w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-9-300x72.jpg 300w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-9-768x184.jpg 768w, https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-content\/uploads\/sites\/38245\/2025\/03\/annotated-CYSE20270_20Linux20System20for20Cybersecurity.docx-4-9-750x180.jpg 750w\" sizes=\"(max-width: 842px) 100vw, 842px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 270: Linux System for CybersecurityAssignment: Lab 4\u2013Group and User Accounts Task A \u2013User Account management (8 * 5 =40 points) Open a terminal window in VM and execute the correct command to display the user accountinformation (including the login shell and home directory) for the current user using grep. 2. Execute the correct command &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/2025\/03\/03\/assignment-lab4\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":9},"categories":[9],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/405"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/405\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/posts\/405\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/categories?post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/tags?post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}