6. As a Windows Administrator for a large company, you are asked to grant temporary software installation permissions to the Sales department. Which of the following would be the most efficient method for accomplishing this task?

  • Grant each employee in the Sales department temporary software installation permissions on their individual User accounts.
  • Grant each employee in the Sales department temporary Local Administrator permissions on their individual computers.
  • Grant temporary Administrator permissions to each employee in the Sales department.
  • Add the User account for each employee in the Sales department into a special Group, then grant temporary software installation permissions to the Group.

7. In the Computer Management tool in Windows, what setting can an administrator enable if a user’s password was compromised and they need to update it?

  • Password never expires
  • User cannot change password
  • User must change password at next logon.
  • Password must be changed

8. Which Windows PowerShell CLI command can be used to list the Users within local Groups on a given computer?

  • Get-LocalGroup
  • Get-LocalUser
  • Get-GPOReport
  • Get-LocalGroupMember

9. On a Linux system, which file contains information about the users on a machine?

  • /etc/sudoers
  • /etc/users
  • /etc/passwd
  • /etc/group

10. What Windows CLI command can be used to change a local user password?

  • user command
  • password command
  • new command
  • net command

11. What flag can be used in Linux with the passwd command to force a user to change their password on the next logon?

  • -new flag
  • -next flag
  • -chg flag
  • -e flag

12. Which of the following methods can Administrators use to remove a user in Windows? (Choose all that apply)

  • At the CLI, using the DOS style net computer computername/del command.
  • With Powershell, use the Remove-LocalUser usernamecommand.
  • At the CLI, use the DOS style net user username /del command.
  • In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and select Delete.

13. What does DACL stand for?

  • Discretionary Access Control List
  • Direct Access Control List
  • Discretionary Access Content List
  • Discretionary Admin Control List

14. When examining the permissions on a file in Linux, how many bits are used to display this information?

  • 16
  • 9
  • 64
  • 10

15. In Windows, when setting the basic permission “Read” which of the following special permissions are enabled? (Choose all that apply)

  • Read Data
  • Read Activity
  • Read Attributes
  • Read Permissions

Shuffle Q/A 1

16. On a Linux system, what is the first user that gets automatically created?

  • privileged user
  • admin user
  • user 1
  • root user

17. What is the name of the privileged file on Linux that stores scramble passwords?

  • /passwords
  • /etc/shade
  • /etc/shadow
  • /etc/passwords

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply