1. What are the basic Linux file permissions? Check all that apply.
Answers
·
Read
·
Write
·
Modify
·
Execute
2. You're given the
output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What does the first character of output signify?
Answers
·
books_file is a directory
·
The file owner is a class D user
·
books_file is a disk device
·
The file owner has delete permissions
Explanation: Very nice! I will be able to assist you in interpreting the information if you supply me with the result of the ls -l command for the particular file in question. In most cases, the output contains information on the file's rights, the number of links, the owner, the group, the file size, the modification time, and the name of the file or directory. Please don't hesitate to send along the pertinent part, and we'll look it over jointly when you do.
3. You're given the
output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: Who does the last trio of bits (r--) in the file
permission and attributes refer to?
Answers
·
All other users
·
File owner
·
Group file belongs to
· Regular file
4. You're given the
output of an ls -l of a file in Linux.
1 ls -l books_file
2 dr-x-wxr-- 1 phelan cool_group 0 Aug 20 11:10 books_file
Answer the following question: What permissions does the second trio of bits
(-wx) give you? Check all that apply.
Answers
·
Read
·
Write
·
Group file belongs to
· Execute
5. If I wanted to change
permissions of a file called honey_bears, what command could I use to grant
write access to the owner of the file without changing other permissions? The
owner currently only has read access to the file. Check all that apply.
Answers
·
chmod u+w honey_bears
·
chmod o+w honey_bears
·
chmod 644 honey_bears
·
chmod 400 honey_bears
6. As a Windows Administrator for a
large company, you are asked to grant temporary software installation
permissions to the Sales department. Which of the following would be the most
efficient method for accomplishing this task?
Answers
·
Grant
each employee in the Sales department temporary software installation
permissions on their individual User accounts.
·
Grant
each employee in the Sales department temporary Local Administrator permissions
on their individual computers.
·
Grant
temporary Administrator permissions to each employee in the Sales department.
·
Add the User account for each employee in the Sales department
into a special Group, then grant temporary software installation permissions to
the Group.
7. In the Computer Management tool
in Windows, what setting can an administrator enable if a user’s password was
compromised and they need to update it?
Answers
·
Password
never expires
·
User
cannot change password
·
User must change password at next logon.
·
Password
must be changed
8. Which Windows PowerShell CLI
command can be used to list the Users within local Groups on a given computer?
Answers
·
Get-LocalGroup
·
Get-LocalUser
·
Get-GPOReport
·
Get-LocalGroupMember
9. On a Linux system, which file
contains information about the users on a machine?
Answers
·
/etc/sudoers
·
/etc/users
·
/etc/passwd
·
/etc/group
Answers
·
user
command
·
password
command
·
new
command
·
net
command
Answers
·
-new
flag
·
-next
flag
·
-chg
flag
·
-e
flag
Answers
·
At
the CLI, using the DOS style net computer computername/del command.
·
With Powershell, use the Remove-LocalUser
usernamecommand.
·
At the CLI, use the DOS style net user
username /del command.
·
In the GUI, under Local Users and Groups in
the Computer Management tool, right click the user and select Delete.
Answers
·
Discretionary
Access Control List
·
Direct
Access Control List
·
Discretionary
Access Content List
·
Discretionary
Admin Control List
In more
layman's words, DACL is a system that regulates who can access a resource and
what activities they can take on that resource. It also controls what actions
they can conduct on the resource itself.
Answers
·
16
·
9
·
64
·
10
15. In Windows, when setting the
basic permission “Read” which of the following special permissions are enabled?
(Choose all that apply)
Answers
·
Read Data
·
Read
Activity
·
Read
Attributes
·
Read
Permissions
16. On a Linux system, what is the first user that gets
automatically created?
Answers
·
privileged
user
·
admin
user
·
user
1
·
root user
When
working with the root account, it is essential to take extreme care since the
account has full access to the system, which, if mishandled, might result in
undesirable outcomes. It is advised that ordinary user accounts be used for
day-to-day work, and that switching to the root account should only be done
when absolutely essential for duties relating to system administration.
Answers
·
/passwords
·
/etc/shade
·
/etc/shadow
·
/etc/passwords
18. When adding a new user with the
same name as a previously deleted user, will the newly created user be able to
access resources previously assigned to that user name?
Answers
·
No
·
Maybe
·
Yes
As a
consequence of this, the newly created user will not have the same ownership of
files or rights on resources (files, directories, and so on) that were
previously connected with the UID of the user who was removed. Any prior tasks
or permissions that were assigned to the UID of the user who has been removed
will not carry over to the new user.
When
dealing with user management, it is essential to be aware of this in order to
prevent any possible misunderstanding or security concerns that may arise. If
you want the newly created user to have the same rights and affiliations as the
user who was previously removed, you will have to manually set up the relevant
permissions and associations.
Answers
·
admin
permissions.
·
special permissions.
·
user
permissions.
·
partial
permissions.
For
instance, when you give the straightforward permission "Read" to a
person or group, it also contains a range of fine-grained or specialized rights
such as "Read Attributes," "Read Extended Attributes," and
"Read Permissions." Each of these specialized permissions relates to
a particular activity that involves reading information or metadata about a
file or directory. These permissions may be found in the "Reading"
category.
In
conclusion, a basic permission in Windows comprises a wider collection of
fine-grained access control permissions that collectively describe the
activities that a user or group is authorized to execute on a resource. These
rights may be assigned to a user or group individually or collectively.
Answers
·
Standard
·
General
·
Limited
·
Administrator
21. In Windows, what does UAC stand
for?
Answers
·
User Access Control
·
User
Access Console
·
User
Administration Control
·
User
Availability Checklist
When users
try to conduct activities that need elevated capabilities, such as installing
software, changing system settings, or editing files in protected system
folders, UAC asks them for confirmation or an administrator password. These
operations include installing software, changing system settings, and modifying
files. This helps to prevent unauthorized or malicious alterations to the
system and decreases the possibility of any unforeseen security vulnerabilities
that may have been introduced.
Answers
·
In
the GUI, under Control Panel > System and Security > Change User Account
Control Settings.
·
At the CLI, using the DOS style net user
command.
·
In the GUI, under Local Users and Groups in
the Computer Management tool.
·
At
the CLI, using the DOS style net config command.
Answers
·
Read & Execute
·
Write
·
Change
·
List folder contents
Answers
·
It
is a directory file and the owner has read, write, and exchange permissions.
·
It is a regular file and the owner has read,
write, and execute permissions.
·
It
is a regular file and the owner has read, write, but no execute permissions.
·
It
is a directory file and the owner has read, write, and execute permissions.
Answers
·
WD
·
CF
·
S
·
Write
26. Which Windows PowerShell CLI
command can be used to list the Groups on a given computer?
Answers
·
Get-LocalUser
·
Get-LocalGroupMember
·
Get-GPOReport
·
Get-LocalGroup
Answers
·
/etc/sudoers
·
/etc/users
·
/etc/passwd
· /etc/group
Answers
·
At
the CLI, using the DOS style net computer computername/new command.
·
With
Powershell, use the Create-LocalUser usernamecommand.
·
At the CLI, use the DOS style net user
username * /add command.
·
In the GUI, under Local Users and Groups in
the Computer Management tool, right click Users and select New User.
Answers
·
Yes
·
Maybe
·
No
30. Which Windows
PowerShell CLI command can be used to list the Users on a given computer?
Answers
·
Get-GPOReport
·
Get-LocalGroupMember
·
Get-LocalUser
·
Get-LocalGroup
31. What parameter can
be used in the Windows CLI to force a user to change their password on the next
logon?
Answers
·
/passwordchg:yes
·
/newpassword:logon
·
/logonpasswordchg:yes
·
/passwordkeep:no
32. Does an
administrator user account on a computer have complete control over a machine?
Answers
·
No
·
Yes
·
Sometimes
Explanation: Even though administrator accounts give a substantial amount of authority, it is essential for users to exhibit care while working with these rights in order to prevent inadvertent modifications that may have an effect on the stability and security of the system. According to the concept of least privilege, regular user accounts should be used for day-to-day operations, and switching to an administrator account should only be done when absolutely essential for administrative responsibilities.