6. As a Windows Administrator for a large company, you are asked to grant temporary software installation permissions to the Sales department. Which of the following would be the most efficient method for accomplishing this task?
- Grant each employee in the Sales department temporary software installation permissions on their individual User accounts.
- Grant each employee in the Sales department temporary Local Administrator permissions on their individual computers.
- Grant temporary Administrator permissions to each employee in the Sales department.
- Add the User account for each employee in the Sales department into a special Group, then grant temporary software installation permissions to the Group.
7. In the Computer Management tool in Windows, what setting can an administrator enable if a user’s password was compromised and they need to update it?
- Password never expires
- User cannot change password
- User must change password at next logon.
- Password must be changed
8. Which Windows PowerShell CLI command can be used to list the Users within local Groups on a given computer?
- Get-LocalGroup
- Get-LocalUser
- Get-GPOReport
- Get-LocalGroupMember
9. On a Linux system, which file contains information about the users on a machine?
- /etc/sudoers
- /etc/users
- /etc/passwd
- /etc/group
10. What Windows CLI command can be used to change a local user password?
- user command
- password command
- new command
- net command
11. What flag can be used in Linux with the passwd command to force a user to change their password on the next logon?
- -new flag
- -next flag
- -chg flag
- -e flag
12. Which of the following methods can Administrators use to remove a user in Windows? (Choose all that apply)
- At the CLI, using the DOS style net computer computername/del command.
- With Powershell, use the Remove-LocalUser usernamecommand.
- At the CLI, use the DOS style net user username /del command.
- In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and select Delete.
13. What does DACL stand for?
- Discretionary Access Control List
- Direct Access Control List
- Discretionary Access Content List
- Discretionary Admin Control List
14. When examining the permissions on a file in Linux, how many bits are used to display this information?
- 16
- 9
- 64
- 10
15. In Windows, when setting the basic permission “Read” which of the following special permissions are enabled? (Choose all that apply)
- Read Data
- Read Activity
- Read Attributes
- Read Permissions
Shuffle Q/A 1
16. On a Linux system, what is the first user that gets automatically created?
- privileged user
- admin user
- user 1
- root user
17. What is the name of the privileged file on Linux that stores scramble passwords?
- /passwords
- /etc/shade
- /etc/shadow
- /etc/passwords