Skip to content

Grading Rubric

Criterion Strong (3) Adequate (2) Weak (1)
Identified misleading symptom Tested git clone directly on the host; distinguished between SSH agent and network connectivity issues quickly Investigated Ansible config and SSH settings first, then tested direct connectivity Spent extended time comparing host configurations or Ansible task parameters
Found root cause in linux_ops domain Found both the sudoers issue and the network block; correctly identified the network as the primary cause Found the SSH agent issue but not the security group firewall rule Assumed it was purely an Ansible configuration or SSH key problem
Remediated in networking domain Updated security group, fixed sudoers, updated provisioning template Fixed the security group but not the sudoers or provisioning template Worked around it by using HTTPS git clone or copying the key manually
Cross-domain thinking Explained the dual-issue nature: firewall was the primary block, sudoers was a secondary issue; proposed eliminating agent forwarding Acknowledged both issues but treated them as equal weight Treated it as a single-domain Ansible or SSH problem

Prerequisite Topic Packs

  • ansible — needed for Domain A investigation (playbook tasks, SSH connection, become/sudo)
  • ssh-deep-dive — needed for Domain B root cause (agent forwarding, SSH_AUTH_SOCK, sudo environment)
  • linux-users-and-permissions — needed for Domain B (sudoers configuration, env_keep)
  • firewalls — needed for Domain C remediation (security groups, egress rules)
  • aws-networking — needed for Domain C (AWS security groups, VPC subnet routing)