Defining Linux OS and Application Backup and Recovery Procedures
Course Name and Number: *******
Student Name: *********
Instructor Name: *********
Lab Due Date: March 31st, 2019
Lab Assessment Questions
1. Why is encrypting an already compressed file necessary?
Answer: Encrypting an already compressed file is necessary because compression by itself is not
security; it is merely breaking down a bigger file to utilize fewer bites to make it take up less
space overall on the system it is stored and utilized on.
3. Why is performing messaging, such as emails, in an encrypted fashion recommended as part
of a secure communications strategy? Explain.
Answer: It is recommended to encrypt email and other messaging means to prevent any
unwanted persons from intercepting communications to and from sensitive sources.
5. How is it possible to recover a deleted file from the pseudo file system /proc?
Answer: It is possible to recover a deleted file from the pseudo file system /proc due to the file
system containing data in regard to any file still being used ‘in the background’ by the system
regardless if it has been deleted. If the session of the file is closed and not suspended, while it is
deleted this can make it unable to be recovered via the /proc directory versus having to do a full
restore.
7. What process ID did you record in Part 3 of this lab?
Answer: PID is 2264 for the hacked.sh less process hold.
Section 1: Part 2: Prompt 2: document the time you started this set of steps- 1427
Section 1: Part 2: Prompt 8: document time you completed set of steps- 1438
RTO: 11 minutes several hiccups took place. [prompted actions did not match up with required
actions] This may resemble any issues encountered in the RTO for real-life situations.
Section: Part 3: Prompt 12: record the file descriptor for the hacked.sh file- 4
This study source was downloaded by 100000899606070 from CourseHero.com on 09-27-2025 21:11:50 GMT -05:00
https://www.coursehero.com/file/39924982/Bishop-ISSC344-wk8-lab10docx/