Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony takewhile usinga peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?

A. ?He should designate all the files in the shared folder as execute-only.
B. ?He should designate all the files in the shared folder as author only by using the chown command.
C. ?He should designate all the files in the shared folder as client only by using the chgrp command.
D. ?He should designate all the files in the shared folder as read-only.


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following best describes a DMZ?

A. a network of computers configured with robust firewall software B. a subnet of publicly accessible servers placed outside the internal network C. a private subnet that is inaccessible to both the Internet and the company network D. a proxy server farm used to protect the identity of internal servers

Computer Science & Information Technology

The main types of testing are ____ testing.

A. white-box and blue-box B. black-box and blue-box C. white-box and green-box D. white-box and black-box

Computer Science & Information Technology

Which the following flags are used to establish a TCP connection?

A. PSH B. ACK C. SYN D. URG E. FIN

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. An in-memory database (IMDB) is a database management system that stores an entire database in read-only memory (ROM). 2. In spreadsheets programs, Excel Solver can be used by the end users to perform “what if” analysis for the evaluation of various alternatives. 3. Online analytical processing (OLAP) enables users to identify issues and opportunities as well as perform trend analysis. 4. Online analytical processing (OLAP) involves the interactive examination of high-level summary data in increasing detail. 5. Case-based reasoning technique of data mining contains a specialized set of algorithms that sorts through data and forms statistical rules about relationships among the items.

Computer Science & Information Technology