1. What are the basic Linux file permissions? Check all that apply.
Answers
· Read
· Write
· Modify
· Execute
2. You're given the output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What does the first character of output signify?
Answers
· books_file is a directory
· The file owner is a class D user
· books_file is a disk device
· The file owner has delete permissions
Explanation: Very nice! I will be able to assist you in interpreting the information if you supply me with the result of the ls -l command for the particular file in question. In most cases, the output contains information on the file's rights, the number of links, the owner, the group, the file size, the modification time, and the name of the file or directory. Please don't hesitate to send along the pertinent part, and we'll look it over jointly when you do.
3. You're given the output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: Who does the last trio of bits (r--) in the file permission and attributes refer to?
Answers
· All other users
· File owner
· Group file belongs to
· Regular file
4. You're given the output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What permissions does the second trio of bits (-wx) give you? Check all that apply.
Answers
· Read
· Write
· Group file belongs to
· Execute
5. If I wanted to change permissions of a file called honey_bears, what command could I use to grant write access to the owner of the file without changing other permissions? The owner currently only has read access to the file. Check all that apply.
Answers
· chmod u+w honey_bears
· chmod o+w honey_bears
· chmod 644 honey_bears
· chmod 400 honey_bears
6. As a Windows Administrator for a large company, you are asked to grant temporary software installation permissions to the Sales department. Which of the following would be the most efficient method for accomplishing this task?
Answers
· Grant each employee in the Sales department temporary software installation permissions on their individual User accounts.
· Grant each employee in the Sales department temporary Local Administrator permissions on their individual computers.
· Grant temporary Administrator permissions to each employee in the Sales department.
· Add the User account for each employee in the Sales department into a special Group, then grant temporary software installation permissions to the Group.
7. In the Computer Management tool in Windows, what setting can an administrator enable if a user’s password was compromised and they need to update it?
Answers
· Password never expires
· User cannot change password
· User must change password at next logon.
· Password must be changed
8. Which Windows PowerShell CLI command can be used to list the Users within local Groups on a given computer?
Answers
· Get-LocalGroup
· Get-LocalUser
· Get-GPOReport
· Get-LocalGroupMember
9. On a Linux system, which file contains information about the users on a machine?
Answers
· /etc/sudoers
· /etc/users
· /etc/passwd
· /etc/group
Answers
· user command
· password command
· new command
· net command
Answers
· -new flag
· -next flag
· -chg flag
· -e flag
Answers
· At the CLI, using the DOS style net computer computername/del command.
· With Powershell, use the Remove-LocalUser usernamecommand.
· At the CLI, use the DOS style net user username /del command.
· In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and select Delete.
Answers
· Discretionary Access Control List
· Direct Access Control List
· Discretionary Access Content List
· Discretionary Admin Control List
In more layman's words, DACL is a system that regulates who can access a resource and what activities they can take on that resource. It also controls what actions they can conduct on the resource itself.
Answers
· 16
· 9
· 64
· 10
15. In Windows, when setting the basic permission “Read” which of the following special permissions are enabled? (Choose all that apply)
Answers
· Read Data
· Read Activity
· Read Attributes
· Read Permissions
16. On a Linux system, what is the first user that gets automatically created?
Answers
· privileged user
· admin user
· user 1
· root user
When working with the root account, it is essential to take extreme care since the account has full access to the system, which, if mishandled, might result in undesirable outcomes. It is advised that ordinary user accounts be used for day-to-day work, and that switching to the root account should only be done when absolutely essential for duties relating to system administration.
Answers
· /passwords
· /etc/shade
· /etc/shadow
· /etc/passwords
18. When adding a new user with the same name as a previously deleted user, will the newly created user be able to access resources previously assigned to that user name?
Answers
· No
· Maybe
· Yes
As a consequence of this, the newly created user will not have the same ownership of files or rights on resources (files, directories, and so on) that were previously connected with the UID of the user who was removed. Any prior tasks or permissions that were assigned to the UID of the user who has been removed will not carry over to the new user.
When dealing with user management, it is essential to be aware of this in order to prevent any possible misunderstanding or security concerns that may arise. If you want the newly created user to have the same rights and affiliations as the user who was previously removed, you will have to manually set up the relevant permissions and associations.
Answers
· admin permissions.
· special permissions.
· user permissions.
· partial permissions.
For instance, when you give the straightforward permission "Read" to a person or group, it also contains a range of fine-grained or specialized rights such as "Read Attributes," "Read Extended Attributes," and "Read Permissions." Each of these specialized permissions relates to a particular activity that involves reading information or metadata about a file or directory. These permissions may be found in the "Reading" category.
In conclusion, a basic permission in Windows comprises a wider collection of fine-grained access control permissions that collectively describe the activities that a user or group is authorized to execute on a resource. These rights may be assigned to a user or group individually or collectively.
Answers
· Standard
· General
· Limited
· Administrator
21. In Windows, what does UAC stand for?
Answers
· User Access Control
· User Access Console
· User Administration Control
· User Availability Checklist
When users try to conduct activities that need elevated capabilities, such as installing software, changing system settings, or editing files in protected system folders, UAC asks them for confirmation or an administrator password. These operations include installing software, changing system settings, and modifying files. This helps to prevent unauthorized or malicious alterations to the system and decreases the possibility of any unforeseen security vulnerabilities that may have been introduced.
Answers
· In the GUI, under Control Panel > System and Security > Change User Account Control Settings.
· At the CLI, using the DOS style net user command.
· In the GUI, under Local Users and Groups in the Computer Management tool.
· At the CLI, using the DOS style net config command.
Answers
· Read & Execute
· Write
· Change
· List folder contents
Answers
· It is a directory file and the owner has read, write, and exchange permissions.
· It is a regular file and the owner has read, write, and execute permissions.
· It is a regular file and the owner has read, write, but no execute permissions.
· It is a directory file and the owner has read, write, and execute permissions.
Answers
· WD
· CF
· S
· Write
26. Which Windows PowerShell CLI command can be used to list the Groups on a given computer?
Answers
· Get-LocalUser
· Get-LocalGroupMember
· Get-GPOReport
· Get-LocalGroup
Answers
· /etc/sudoers
· /etc/users
· /etc/passwd
· /etc/group
Answers
· At the CLI, using the DOS style net computer computername/new command.
· With Powershell, use the Create-LocalUser usernamecommand.
· At the CLI, use the DOS style net user username * /add command.
· In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and select New User.
Answers
· Yes
· Maybe
· No
30. Which Windows PowerShell CLI command can be used to list the Users on a given computer?
Answers
· Get-GPOReport
· Get-LocalGroupMember
· Get-LocalUser
· Get-LocalGroup
31. What parameter can be used in the Windows CLI to force a user to change their password on the next logon?
Answers
· /passwordchg:yes
· /newpassword:logon
· /logonpasswordchg:yes
· /passwordkeep:no
32. Does an administrator user account on a computer have complete control over a machine?
Answers
· No
· Yes
· Sometimes
Explanation: Even though administrator accounts give a substantial amount of authority, it is essential for users to exhibit care while working with these rights in order to prevent inadvertent modifications that may have an effect on the stability and security of the system. According to the concept of least privilege, regular user accounts should be used for day-to-day operations, and switching to an administrator account should only be done when absolutely essential for administrative responsibilities.