CompTIA Security+ Question I-38

A network inventory discovery application requires non-privileged access to all hosts on a network for inventory of installed applications. A service account is created by the network inventory discovery application for accessing all hosts. Which of the following is the MOST efficient method for granting the account non-privileged access to the hosts?

A. Implement Group Policy to add the account to the users group on the hosts
B. Add the account to the Domain Administrator group
C. Add the account to the Users group on the hosts
D. Implement Group Policy to add the account to the Power Users group on the hosts.

Answer: A

Explanation:
Group Policy is an infrastructure that allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory directory service containers: sites, domains, or organizational units (OUs). This means that if the GPO is linked to the domain, all Users groups in the domain will include the service account.

CompTIA A+ Core 2 Question H-19

Despite objections, the Chief Executive Officer (CEO) wanted all managers to have administrator rights to their workstations. After a few months, the CEO was replaced. A technician is assigned the task of changing the managers to power users on the domain. Which of the following is the BEST choice to complete this task?

A. rstrui.exe
B. gpedit.msc
C. lusrmgr.msc
D. usergroup.exe

Correct Answer: B

CompTIA A+ Core 2 Question G-60

A small business owner is looking to assign users to a Windows group level. They have the following requirements for these users, and stress that they should receive no more privileges than necessary: The users should not be able to change passwords for higher level accounts. The users need the ability to install software. The users cannot create new accounts for others. Which of the following group levels will BEST meet these needs?

A. Remote Desktop Users
B. Power Users
C. Standard Users
D. Administrators

Correct Answer: B

CompTIA A+ Core 2 Question G-6

After loading a new operating system, which of the following accounts is MOST often changed for security purposes?

A. Standard User
B. Power User
C. Guest
D. System

Correct Answer: C