Consider the cyops.mn file as an example. Who is the owner of the file? How about the group?
File Permissions
Visualize and Change the File Permissions.
a. Navigate to /home/analyst/lab.support.files/scripts/.
[analyst@secOps ~]$ cd lab.support.files/scripts/
b. Use the ls -l command to display file permissions.
[analyst@secOps scripts]$ ls -l
total 60
-rwxr-xr-x 1 analyst analyst 190 Jun 13 09:45 configure_as_dhcp.sh
-rwxr-xr-x 1 analyst analyst 192 Jun 13 09:45 configure_as_static.sh
-rwxr-xr-x 1 analyst analyst 3459 Jul 18 10:09 cyberops_extended_topo_no_fw.py
-rwxr-xr-x 1 analyst analyst 4062 Jul 18 10:09 cyberops_extended_topo.py
-rwxr-xr-x 1 analyst analyst 3669 Jul 18 10:10 cyberops_topo.py
-rw-r--r-- 1 analyst analyst 2871 Apr 28 11:27 cyops.mn
-rwxr-xr-x 1 analyst analyst 458 May 1 13:50 fw_rules
-rwxr-xr-x 1 analyst analyst 70 Apr 28 11:27 mal_server_start.sh
drwxr-xr-x 2 analyst analyst 4096 Jun 13 09:55 net_configuration_files
-rwxr-xr-x 1 analyst analyst 65 Apr 28 11:27 reg_server_start.sh
-rwxr-xr-x 1 analyst analyst 189 Dec 15 2016 start_ELK.sh
-rwxr-xr-x 1 analyst analyst 85 Dec 22 2016 start_miniedit.sh
-rwxr-xr-x 1 analyst analyst 76 Jun 22 11:38 start_pox.sh
-rwxr-xr-x 1 analyst analyst 106 Jun 27 09:47 start_snort.sh
-rwxr-xr-x 1 analyst analyst 61 May 4 11:45 start_tftpd.sh
Owner: analyst; Group: analyst
You might also like to view...
When testing with a paper prototype, how much of the Web site do you need to prototype?
What will be an ideal response?
A ____________ is the smallest unit of space on which your screen can write.
(a) pixel (b) dot (c) bit (d) font
A company using a MSSP service is a form of
A. Security Outsourcing B. Security Insurance C. Security in Depth D. Security Planning
Which of the following is not an advantage of functions in C?
A. Problems can be factored into understandable and manageable steps. B. Functions make it possible to develop programs easily and rapidly. C. Functions provide a way to reuse code. D. Functions can be grouped into libraries for reuseability. E. Functions protect data from accidental access by other functions.