1. What are the basic linux file permissions? Check all that apply.
- Read
- Write
- Modify
- Execute
2. You’re given the output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr– 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What does the first character of output signify?
- books_file is a directory
- The file owner is a class D user
- books_file is a disk device
- The file owner has delete permissions
3. You’re given the output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr– 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: Who does the last trio of bits (r–) in the file permission and attributes refer to?
- All other users
- File owner
- Group file belongs to
- Regular file
4. You’re given the output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr– 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What permissions does the second trio of bits (-wx) give you? Check all that apply.
- Read
- Write
- Group file belongs to
- Execute
5. If I wanted to change permissions of a file called honey_bears, what command could I use to grant write access to the owner of the file without changing other permissions? The owner currently only has read access to the file. Check all that apply.
- chmod u+w honey_bears
- chmod o+w honey_bears
- chmod 644 honey_bears
- chmod 400 honey_bears
6. As a Windows Administrator for a large company, you are asked to grant temporary software installation permissions to the Sales department. Which of the following would be the most efficient method for accomplishing this task?
- Grant each employee in the Sales department temporary software installation permissions on their individual User accounts.
- Grant each employee in the Sales department temporary Local Administrator permissions on their individual computers.
- Grant temporary Administrator permissions to each employee in the Sales department.
- Add the User account for each employee in the Sales department into a special Group, then grant temporary software installation permissions to the Group.
7. In the Computer Management tool in Windows, what setting can an administrator enable if a user’s password was compromised and they need to update it?
- Password never expires
- User cannot change password
- User must change password at next logon.
- Password must be changed
8. Which Windows PowerShell CLI command can be used to list the Users within local Groups on a given computer?
- Get-LocalGroup
- Get-LocalUser
- Get-GPOReport
- Get-LocalGroupMember
9. On a Linux system, which file contains information about the users on a machine?
- /etc/sudoers
- /etc/users
- /etc/passwd
- /etc/group
10. What Windows CLI command can be used to change a local user password?
- user command
- password command
- new command
- net command
11. What flag can be used in Linux with the passwd command to force a user to change their password on the next logon?
- -new flag
- -next flag
- -chg flag
- -e flag
12. Which of the following methods can Administrators use to remove a user in Windows? (Choose all that apply)
- At the CLI, using the DOS style net computer computername/del command.
- With Powershell, use the Remove-LocalUser usernamecommand.
- At the CLI, use the DOS style net user username /del command.
- In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and select Delete.
13. What does DACL stand for?
- Discretionary Access Control List
- Direct Access Control List
- Discretionary Access Content List
- Discretionary Admin Control List
14. When examining the permissions on a file in Linux, how many bits are used to display this information?
- 16
- 9
- 64
- 10
15. In Windows, when setting the basic permission “Read” which of the following special permissions are enabled? (Choose all that apply)
- Read Data
- Read Activity
- Read Attributes
- Read Permissions
16. On a Linux system, what is the first user that gets automatically created?
- privileged user
- admin user
- user 1
- root user
17. What is the name of the privileged file on Linux that stores scramble passwords?
- /passwords
- /etc/shade
- /etc/shadow
- /etc/passwords
18. When adding a new user with the same name as a previously deleted user, will the newly created user be able to access resources previously assigned to that user name?
- No
- Maybe
- Yes
19. In Windows, a simple permission is actually a larger set of ___
- admin permissions.
- special permissions.
- user permissions.
- partial permissions.
20. Generally, what type of user has access to, but limited control over a computer?
- Standard
- General
- Limited
- Administrator
21. In Windows, what does UAC stand for?
- User Access Control
- User Access Console
- User Administration Control
- User Availability Checklist
22. Which of the following locations and/or methods can Administrators find and/or use to change user passwords on Windows systems? (Choose all that apply)
- In the GUI, under Control Panel > System and Security > Change User Account Control Settings.
- At the CLI, using the DOS style net user command.
- In the GUI, under Local Users and Groups in the Computer Management tool.
- At the CLI, using the DOS style net config command.
23. In Windows, which of the following are directory and file permissions that can be assigned to groups and/or users? (Choose all that apply)
- Read & Execute
- Write
- Change
- List folder contents
24. When examining the permissions on a file in Linux you find the the first four bits are -rwx. What does this mean?
- It is a directory file and the owner has read, write, and exchange permissions.
- It is a regular file and the owner has read, write, and execute permissions.
- It is a regular file and the owner has read, write, but no execute permissions.
- It is a directory file and the owner has read, write, and execute permissions.
25. When using ICACL in the Windows CLI, what flag shows that a given user can create files?
- WD
- CF
- S
- write
26. Which Windows PowerShell CLI command can be used to list the Groups on a given computer?
- Get-LocalUser
- Get-LocalGroupMember
- Get-GPOReport
- Get-LocalGroup
27. On a Linux system, which file contains information about group memberships?
- /etc/sudoers
- /etc/users
- /etc/passwd
- /etc/group
28. Which of the following methods can Administrators use to add a user in Windows? (Choose all that apply)
- At the CLI, using the DOS style net computer computername/new command.
- With Powershell, use the Create-LocalUser usernamecommand.
- At the CLI, use the DOS style net user username * /add command.
- In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and select New User.
29. Is it possible to have write access to a file in Windows without having read access to that same file?
- Yes
- Maybe
- No
30. Which Windows PowerShell CLI command can be used to list the Users on a given computer?
- Get-GPOReport
- Get-LocalGroupMember
- Get-LocalUser
- Get-LocalGroup
31. What parameter can be used in the Windows CLI to force a user to change their password on the next logon?
- /passwordchg:yes
- /newpassword:logon
- /logonpasswordchg:yes
- /passwordkeep:no
32. Does an administrator user account on a computer have complete control over a machine?
- No
- Yes
- Sometimes