Professional Documents
Culture Documents
Contents
WEEK 2: USERS, ADMINISTRATORS, GROUPS, PERMISSIONS ...................................................................... 1
WEEK 3: PACKAGE AND SOFTWARE MANAGEMENT.................................................................................... 7
WEEK 4: FILESYSTEMS ................................................................................................................................. 12
WEEK 5: PROCESS MANAGEMENT.............................................................................................................. 18
WEEK 6: OPERATING SYSTEM IN PRACTICE ................................................................................................ 24
Does an administrator user account on a computer have complete control over a machine?
Yes
No
Sometimes
In the Computer Management tool in Windows, what setting can an administrator enable if a user’s
password was compromised and they need to update it?
Get-LocalGroupMember
Get-LocalGroup
Get-LocalUser
Get-GPOReport
/etc/passwd
/etc/group
/etc/users
/etc/sudoers
What parameter can be used in the Windows CLI to force a user to change their password on the next
logon?
/passwordchg:yes
/passwordkeep:no
/newpassword:logon
/logonpasswordchg:yes
What is the name of the privileged file on Linux that stores scramble passwords?
/etc/passwords
/etc/shade
/passwords
/etc/shadow
Which of the following methods can Administrators use to add a user in Windows? (Choose all that
apply)
At the CLI, using the DOS style net computer computername/new command.
With Powershell, use the Create-LocalUser usernamecommand.
At the CLI, use the DOS style net user username * /add command.
In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and
select New User.
When examining the permissions on a file in Linux you find the the first four bits are -rwx. What does
this mean?
It is a regular file and the owner has read, write, and execute permissions.
It is a regular file and the owner has read, write, but no execute permissions.
It is a directory file and the owner has read, write, and exchange permissions.
It is a directory file and the owner has read, write, and execute permissions
In Windows, when setting the basic permission “Read” which of the following special permissions
are enabled? (Choose all that apply)
Read Activity
Read Permissions
Read Attributes
Read Data
Which of the following locations and/or methods can Administrators find and/or use to change user
passwords on Windows systems? (Choose all that apply)
In the GUI, under Control Panel > System and Security > Change User Account Control Settings.
At the CLI, using the DOS style net user command.
In the GUI, under Local Users and Groups in the Computer Management tool.
At the CLI, using the DOS style net config command.
On Linux systems, which CLI command and flags are used to force a user to change their password
upon their next login? (Choose all that apply)
passwd -eusername
passwd --expire username
user -e username
password -changeusername
When adding a new user with the same name as a previously deleted user, will the newly created
user be able to access resources previously assigned to that user name?
No
Maybe
Yes
When examining the permissions on a file in Linux, how many bits are used to display this
information?
64
10
9
16
When using ICACL in the Windows CLI, what flag shows that a given user can create files?
S
CF
write
WD
Generally, what type of user has access to, but limited control over a computer?
Standard
Limited
General
Administrator
Which of the following methods can Administrators use to remove a user in Windows? (Choose all
that apply)
In the GUI, under Local Users and Groups in the Computer Management tool, right click the user and
select Delete.
With Powershell, use the Remove-LocalUser usernamecommand.
At the CLI, using the DOS style net computer computername/del command.
At the CLI, use the DOS style net user username /del command.
When examining the permissions on a file in Linux you find the the first four bits are -rwx. What does
this mean?
It is a directory file and the owner has read, write, and exchange permissions.
It is a regular file and the owner has read, write, but no execute permissions.
It is a regular file and the owner has read, write, and execute permissions.
It is a directory file and the owner has read, write, and execute permissions.
In Windows, a simple permission is actually a larger set of ___
partial permissions.
special permissions.
admin permissions.
user permissions.
As a Windows Administrator for a large company, you are asked to grant temporary software
installation permissions to the Sales department. Which of the following would be the most efficient
method for accomplishing this task?
Grant each employee in the Sales department temporary software installation permissions on their
individual User accounts.
Grant each employee in the Sales department temporary Local Administrator permissions on their
individual computers.
Grant temporary Administrator permissions to each employee in the Sales department.
Add the User account for each employee in the Sales department into a special Group, then grant
temporary software installation permissions to the Group.
What Windows CLI command can be used to change a local user password?
password command
net command
user command
new command
What flag can be used in Linux with the passwd command to force a user to change their password on
the next logon?
-new flag
-next flag
-e flag
-chg flag
Which of the following methods can Administrators use to add a user in Windows? (Choose all that
apply)
At the CLI, using the DOS style net computer computername/new command.
In the GUI, under Local Users and Groups in the Computer Management tool, right click Users and
select New User.
With Powershell, use the Create-LocalUser usernamecommand.
At the CLI, use the DOS style net user username * /add command.
Imagine you are an IT administrator and you need to check that proper permissions are configured
on a file in Linux. The file’s owner should have full permissions. The file’s associated group members
should be able to read and write to the file, but not execute the file. Other users can only read the
file. How should these file permissions look when you check them in the CLI environment?
-rwerw-r- -
Drwxrw-r- -
-r- -rw-rwx
-rwxrw-r- -
Which of the following package formats is used by the Windows Store to distribute universal
Windows platform apps?
Which of the following file types is used to guide software installations in Ubuntu?
.deb files
.msi files
.mpg files
.exe files
Fill in the blank: _____ are a central managed marketplace for app developers to publish and sell
mobile apps.
Package managers
Debian packages
Windows executables
App stores
Which of the following Powershell commands will take all files from the desktop “TestArchive”
directory, and archive it in a “TestArchive.zip” file?
Which of the following Powershell commands will create a directory called “TestArchive” on your
desktop by expanding the TestArchive.zip file?
Which of the following Powershell commands will verify that a software package called
“TestPackage” has been successfully installed on your system?
Which of the following Powershell commands will install a software package called “TestPackage”
on your system?
In Ubuntu, when a device is connected to your computer, a device file is created in the /dev directory.
What kind of device might create a file called /dev/sdc?
A printer
A memory stick
A keyboard
A monitor
When Windows notices that a new device has been connected, what’s the first thing it will do?
Which of the following Ubuntu device files was created by the first detected storage device?
/dev/sd0
/dev/sd1
/dev/sdc
/dev/sda
Which of the following commands will update your Linux application sources?
/apt/repositories.lst
/etc/APT/sources.list
/etc/repository_sources
/etc/repsrc.lst
Which of the following actions will open Windows’ Device Manager console? Select all that apply.
Right-click on “This PC,” in the Windows file menu, then select “Manage”
Open the Run dialog box and type in devmgmt.msc
Restart your computer
Plug in a new device
Which of the following actions may update your Linux device drivers? Select all that apply.
Which of the following commands will install a new version of the Linux kernel?
Puppet
Chocolatey
SCCM
Windows installer
Which of the following actions can be done through right-clicking in Windows’ Device Manager
console? Select all that apply.
Which of the following commands will update your Linux application sources?
uname -r
sudo apt update
sudo apt full-upgrade
install source.list
Which of the following file types are used to guide software installations in Windows? Select all that
apply.
deb files
.msi files
.exe files
.mpg files
APT
Puppet
Launchpad
Gimp
When Windows notices that a new device has been connected, what’s the first thing it will do?
Which of the following will appear as a character device in your Ubuntu /dev directory? Select all that
apply.
A mouse
A keyboard
A CD-ROM
A hard drive
Which of the following commands will show you what Linux kernel version you have?
show NewKernel
sudo apt full-upgrade
uname -r
sudo apt update
Some versions of Linux will automatically run fsck on your computer to check for issues and attempt
to auto-repair the file system. In these cases, when will your system automatically run fsck?
Only when the operating system sets a bit in a metadata file that indicates there's corruption.
At whatever time you schedule your system to run fsck.
Any time you boot your computer.
Only when you update your Linux kernel.
WEEK 4: FILESYSTEMS
Which of the following commands will run the check disk utility and fix any problems it finds?
fsck
chkdsk
chkdsk /F
chkfix
One terabyte.
Two gigabytes.
Two terabytes.
1024 megabytes.
When partitioning a disk and formatting a filesystem, what happens if you choose the “full format”
option? Select all that apply.
Fill in the blank: -------- Virtual memory dedicates an area of the hard drive to use a storage base for
blocks of data called _____.
pages
base storage
databases
RAM
Sixteen
As many as you want
Five
Four
When partitioning a disk and formatting a filesystem, what happens if you enable
compression? Select all that apply.
What can the Windows Memory Manager do? Select all that apply.
Which of the following are partition table schemes? Select all that apply.
The Windows Disk Management Utility provides which of the following? Select all that apply.
Information about a computer’s disks and disk partitions, as well as their file systems
A command line interface
A utility to make modifications to the disk and partitions on a computer
Information about the free and total capacity of disks and partitions on a computer
In Linux, what happens when you enter the command sudo mkfs -t ext4 /dev/sdb1?
When managing memory, where does the operating system keep the most commonly accessed data
pages?
In a special hidden file on the root partition of a volume called page file dot sys
On the hard drive
In RAM
In the cloud
In Linux, when running parted in interactive mode, what happens when you enter the command
mkpart primary linux-swap 5GiB 100%? Select all that apply.
What file attributes are stored in the Master File Table (MFT)? Select all that apply.
ipath table
inode table
ipod table
ilink table
Which of the following are common risks for file corruption?
1024 megabytes.
Two terabytes.
One terabyte.
Two gigabytes.
When partitioning a disk and formatting a filesystem, what happens if you enable compression?
Select all that apply.
In Linux, what happens when you enter the command sudo mkfs -t ext4 /dev/sdb1?
What can the Windows Memory Manager do? Select all that apply.
Copy pages of memory to be read as needed by programs
Format and partition memory
Map virtual memory to physical memory
Stores the user’s favorite photo memories in a virtual album
In Linux, what happens when you enter the command sudo swapon /dev/sdb1?
What file attributes are stored in the Master File Table (MFT)? Select all that apply.
inodes
hardlinks
filenames
softlinks
Disk partitions can be used for which of the following purposes? Select all that apply.
The volume
The filename
The file record number
The creation timestamp
Which of the following Linux commands lists open files and what processes are using them?
uptime
top
ps -ef
lsof
Which of the following tools or commands can be used to monitor resources in Windows? Select all
that apply.
You launch notepad.exe from a PowerShell command prompt. Later, you use Process Explorer to
restart the notepad.exe process? After restart, what is the parent process of notepad.exe?
PING
SUDO
SIGPROF
TOUCH
When using the ps -ef command to read process information in Linux, what is the process’ PPID?
Which of the following methods can be used to get information on processes that are running in
Windows? Select all that apply.
The Powershell process will terminate when the notepad.exe process terminates.
The notepad.exe process will terminate when the Powershell process terminates.
The Powershell process is the parent process for notepad.exe.
The notepad.exe process is the parent process for Powershell.
In the following Linux command, which is the parent process and which is the child?
Which of the following methods will provide information on processes that are running in Linux?
Select all that apply.
Which of the following options in Process Explorer will terminate a selected process? Select all that
apply.
Kill Process Tree
Restart
Suspend
Kill Process
What are the two most common ways to terminate a process in Linux at the CLI? Select two options.
Which of the following Powershell commands will sort processes by amount of non-paged memory,
in descending order?
Which of the following Linux commands shows information about the current time, how long your
system's been running, how many users are logged on, and what the load average of your machine
is?
top
uptime
lsof
ps -ef
When Windows boots up, what is the first non-kernel process that starts?
kernel
less
grep
init
Which of the following process information can you find in Windows Task Manager? Select all that
apply.
When using the ps -x command to check the status of a process in Linux, how would you know if a
process is suspended (stopped)?
You launch notepad.exe from a PowerShell command prompt. Later, you use Process Explorer to
restart the notepad.exe process? After restart, what is the parent process of notepad.exe?
smss.exe
PowerShell (powershell.exe)
notepad.exe
Process Explorer (procexp.exe)
In Linux, what signal is sent when you enter the kill pidcommand?
SIGTSTP
SIGTERM
SIGINT
SIGKILL
Which of the following Powershell commands will sort processes by amount of non-paged memory,
in descending order?
When using the ps -ef command to read process information in Linux, what is the process’ PPID?
Which of the following statements are true about child processes in Windows? Select all that apply.
A child process inherits environment variables and settings from its parent.
A child process is dependent on its parent process until the child process is terminated.
A child process can be terminated by clicking on the X button in the top right corner of the application.
A child process can be terminated by running the taskkill /pidcommand in the CLI.
Which of the following statements are true about SIGINT? Select all that apply.
Which of the following options are available in Process Explorer after right-clicking a running process
in the top window pane? Select all that apply.
In Windows, what information is displayed by the Resource Monitoring tool? Select all that apply.
Information about particular resources on the system (like CPU, Memory, and Network usage)
System hardware properties
Process information along with data about the resources that the process is consuming
Information about current time and how long your system’s been running
What does the top command do in Linux? Select all that apply.
What remote connection tool is built into the command line after PuTTY is installed on a Windows
computer?
Premote
Plink
PuTTYPwrShell
PuTTYcmd
What is one reason you might avoid sharing a folder with everyone on your network in Windows?
What happens when you type the following command in the Linux command line: sudo dd if=/dev/sdd
of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.
When using the SCP command, what information will you need to complete the transfer? (Choose all that
apply)
Destination IP address
Source hostname
Source IP address
Destination user
What happens when you type the following command in the Powershell command line: putty.exe -
ssh alex-chi@104.131.122.215 22?
Which of the following is the Windows command line tool that enables file sharing from the CLI?
net share
share file
share to net
file share
A virtual machine
A VPN network
A cloud-based file hosting service
Software for managing virtual instances
Is it possible to run a virtual instance with Linux on a physical machine that is running Windows?
Maybe
Yes
No
What event grouping can be used in the Windows Event Viewer to filter specific types of events?
Error View
Custom Views
Filter Views
Sorted Logs
It is important that log are regularly cleaned out to make room for new ones. In Linux, what utility
manages this?
logswap
cleanlog
delnewlog
logrotate
What happens when you type the following command in the Linux command line: sudo dd
if=/dev/sdd of=~/Desktop/USBcopy.imge bs=100M? Select all that apply.
Secure copy
Sent, copied, pasted
Send copied parameters
Secure ping
Alex is trying to start an Ubuntu virtual machine for the first time. They’ve already installed Virtual
Box on their Windows computer, which of the following is a good next step?
In Linux, which of the following log files usually contains the most comprehensive list of events?
The top
The middle
The bottom
When using the SCP command, what information will you need to complete the transfer? (Choose all
that apply)
Destination IP address
Source hostname
Destination user
Source IP address
Which of the following can be used to connect securely to a remote computer? (Choose all that apply)
A VPN connection
dynamic-link library
An SSD client
An SSH client
In the Windows Event viewer, what is the highest logging level for an event?
High
Critical
Top
Warning
Direct messages
Diagnostic messages
System startup messages
System messages
To back up a machine
To copy files from remote computers using the Secure Copy protocol (SCP)
To set up a remote desktop
To image a computer system