Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Lab 10 - Assessment Worksheet

Rating
-
Sold
-
Pages
1
Grade
A+
Uploaded on
28-09-2025
Written in
2025/2026

Lab 10 - Assessment Worksheet Defining Linux OS and Application Backup and Recovery Procedures Course Name and Number: ******* Student Name: ********* Instructor Name: ********* Lab Due Date: March 31st, 2019 Lab Assessment Questions 1. Why is encrypting an already compressed file necessary? Answer: Encrypting an already compressed file is necessary because compression by itself is not security; it is merely breaking down a bigger file to utilize fewer bites to make it take up less space overall on the system it is stored and utilized on. 3. Why is performing messaging, such as emails, in an encrypted fashion recommended as part of a secure communications strategy? Explain. Answer: It is recommended to encrypt email and other messaging means to prevent any unwanted persons from intercepting communications to and from sensitive sources. 5. How is it possible to recover a deleted file from the pseudo file system /proc? Answer: It is possible to recover a deleted file from the pseudo file system /proc due to the file system containing data in regard to any file still being used ‘in the background’ by the system regardless if it has been deleted. If the session of the file is closed and not suspended, while it is deleted this can make it unable to be recovered via the /proc directory versus having to do a full restore. 7. What process ID did you record in Part 3 of this lab? Answer: PID is 2264 for the less process hold. Section 1: Part 2: Prompt 2: document the

Show more Read less
Institution
Course

Content preview

Lab 10 - Assessment Worksheet
Defining Linux OS and Application Backup and Recovery Procedures

Course Name and Number: *******
Student Name: *********
Instructor Name: *********
Lab Due Date: March 31st, 2019


Lab Assessment Questions
1. Why is encrypting an already compressed file necessary?
Answer: Encrypting an already compressed file is necessary because compression by itself is not
security; it is merely breaking down a bigger file to utilize fewer bites to make it take up less
space overall on the system it is stored and utilized on.
3. Why is performing messaging, such as emails, in an encrypted fashion recommended as part
of a secure communications strategy? Explain.
Answer: It is recommended to encrypt email and other messaging means to prevent any
unwanted persons from intercepting communications to and from sensitive sources.
5. How is it possible to recover a deleted file from the pseudo file system /proc?
Answer: It is possible to recover a deleted file from the pseudo file system /proc due to the file
system containing data in regard to any file still being used ‘in the background’ by the system
regardless if it has been deleted. If the session of the file is closed and not suspended, while it is
deleted this can make it unable to be recovered via the /proc directory versus having to do a full
restore.
7. What process ID did you record in Part 3 of this lab?
Answer: PID is 2264 for the hacked.sh less process hold.


Section 1: Part 2: Prompt 2: document the time you started this set of steps- 1427
Section 1: Part 2: Prompt 8: document time you completed set of steps- 1438
RTO: 11 minutes several hiccups took place. [prompted actions did not match up with required
actions] This may resemble any issues encountered in the RTO for real-life situations.


Section: Part 3: Prompt 12: record the file descriptor for the hacked.sh file- 4




This study source was downloaded by 100000899606070 from CourseHero.com on 09-27-2025 21:11:50 GMT -05:00


https://www.coursehero.com/file/39924982/Bishop-ISSC344-wk8-lab10docx/

Written for

Course

Document information

Uploaded on
September 28, 2025
Number of pages
1
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$8.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
ScholarShark

Get to know the seller

Seller avatar
ScholarShark (self)
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
7 months
Number of followers
0
Documents
17
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions