Spread the love

1. What are the basic  linux file permissions? Check all that apply.

  • Read
  • Write
  • Modify
  • Execute

2. You’re given the output of an  ls -l of a file in Linux.

1 ls -l books_file

2 dr-x-wxr– 1 phelan cool_group 0 Aug 20 11:10 books_file

Answer the following question: What does the first character of output signify?

  • books_file is a directory
  • The file owner is a class D user
  • books_file is a disk device
  • The file owner has delete permissions

3. You’re given the output of an ls -l of a file in Linux.

1 ls -l books_file

2 dr-x-wxr– 1 phelan cool_group 0 Aug 20 11:10 books_file

Answer the following question: Who does the last trio of bits (r–) in the file permission and attributes refer to?

  • All other users
  • File owner
  • Group file belongs to
  • Regular file

4. You’re given the output of an ls -l of a file in Linux.

1 ls -l books_file

2 dr-x-wxr– 1 phelan cool_group 0 Aug 20 11:10 books_file

Answer the following question: What permissions does the second trio of bits (-wx) give you? Check all that apply.

  • Read
  • Write
  • Group file belongs to
  • Execute

5. If I wanted to change permissions of a file called honey_bears, what command could I use to grant write access to the owner of the file without changing other permissions? The owner currently only has read access to the file. Check all that apply.

  • chmod u+w honey_bears
  • chmod o+w honey_bears
  • chmod 644 honey_bears
  • chmod 400 honey_bears

6. As a Windows Administrator for a large company, you are asked to grant temporary software installation permissions to the Sales department. Which of the following would be the most efficient method for accomplishing this task?

  • Grant each employee in the Sales department temporary software installation permissions on their individual User accounts.
  • Grant each employee in the Sales department temporary Local Administrator permissions on their individual computers.
  • Grant temporary Administrator permissions to each employee in the Sales department.
  • Add the User account for each employee in the Sales department into a special Group, then grant temporary software installation permissions to the Group.

7. In the Computer Management tool in Windows, what setting can an administrator enable if a user’s password was compromised and they need to update it?

  • Password never expires
  • User cannot change password
  • User must change password at next logon.
  • Password must be changed

8. Which Windows PowerShell CLI command can be used to list the Users within local Groups on a given computer?

  • Get-LocalGroup
  • Get-LocalUser
  • Get-GPOReport
  • Get-LocalGroupMember

9. On a Linux system, which file contains information about the users on a machine?

  • /etc/sudoers
  • /etc/users
  • /etc/passwd
  • /etc/group

10. What Windows CLI command can be used to change a local user password?

  • user command
  • password command
  • new command
  • net command

11. What flag can be used in Linux with the passwd command to force a user to change their password on the next logon?

  • -new flag
  • -next flag
  • -chg flag
  • -e flag

12. Which of the following methods can Administrators use to remove a user in Windows? (Choose all that apply)

  • At the CLI, using the DOS style net computer computername/del command.
  • With Powershell, use the Remove-LocalUser usernamecommand.
  • At the CLI, use the DOS style net user username /del command.
  • In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and select Delete.

13. What does DACL stand for?

  • Discretionary Access Control List
  • Direct Access Control List
  • Discretionary Access Content List
  • Discretionary Admin Control List

14. When examining the permissions on a file in Linux, how many bits are used to display this information?

  • 16
  • 9
  • 64
  • 10

15. In Windows, when setting the basic permission “Read” which of the following special permissions are enabled? (Choose all that apply)

  • Read Data
  • Read Activity
  • Read Attributes
  • Read Permissions

16. On a Linux system, what is the first user that gets automatically created?

  • privileged user
  • admin user
  • user 1
  • root user

17. What is the name of the privileged file on Linux that stores scramble passwords?

  • /passwords
  • /etc/shade
  • /etc/shadow
  • /etc/passwords

18. When adding a new user with the same name as a previously deleted user, will the newly created user be able to access resources previously assigned to that user name?

  • No
  • Maybe
  • Yes

19. In Windows, a simple permission is actually a larger set of ___

  • admin permissions.
  • special permissions.
  • user permissions.
  • partial permissions.

20. Generally, what type of user has access to, but limited control over a computer?

  • Standard
  • General
  • Limited
  • Administrator

21. In Windows, what does UAC stand for?

  • User Access Control
  • User Access Console
  • User Administration Control
  • User Availability Checklist

22. Which of the following locations and/or methods can Administrators find and/or use to change user passwords on  Windows systems? (Choose all that apply)

  • In the GUI, under Control Panel > System and Security > Change User Account Control Settings.
  • At the CLI, using the DOS style net user command.
  • In the GUI, under Local Users and Groups in the Computer Management tool.
  • At the CLI, using the DOS style net config command.

23. In Windows, which of the following are directory and file permissions that can be assigned to groups and/or users? (Choose all that apply)

  • Read & Execute
  • Write
  • Change
  • List folder contents

24. When examining the permissions on a file in  Linux you find the the first four bits are -rwx. What does this mean?

  • It is a directory file and the owner has read, write, and exchange permissions.
  • It is a regular file and the owner has read, write, and execute permissions.
  • It is a regular file and the owner has read, write, but no execute permissions.
  • It is a directory file and the owner has read, write, and execute permissions.

25. When using ICACL in the Windows CLI, what flag shows that a given user can create files?

  • WD
  • CF
  • S
  • write

26. Which Windows PowerShell CLI command can be used to list the Groups on a given computer?

  • Get-LocalUser
  • Get-LocalGroupMember
  • Get-GPOReport
  • Get-LocalGroup

27. On a Linux system, which file contains information about group memberships?

  • /etc/sudoers
  • /etc/users
  • /etc/passwd
  • /etc/group

28. Which of the following methods can Administrators use to add a user in Windows? (Choose all that apply)

  • At the CLI, using the DOS style net computer computername/new command.
  • With Powershell, use the Create-LocalUser usernamecommand.
  • At the CLI, use the DOS style net user username * /add command.
  • In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and select New User.

29. Is it possible to have write access to a file in Windows without having read access to that same file?

  • Yes
  • Maybe
  • No

30. Which Windows PowerShell CLI command can be used to list the Users on a given computer?

  • Get-GPOReport
  • Get-LocalGroupMember
  • Get-LocalUser
  • Get-LocalGroup

31. What parameter can be used in the Windows CLI to force a user to change their password on the next logon?

  • /passwordchg:yes
  • /newpassword:logon
  • /logonpasswordchg:yes
  • /passwordkeep:no

32. Does an administrator user account on a computer have complete control over a machine?

  • No
  • Yes
  • Sometimes

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *