An administrator is assigning custom permissions to a user who will back up a system. Using the principle of least permissions, which of the following permissions is needed by the user to perform this task?
a. Modify
b. Read & Execute
c. Write
d. List Folder Contents
D. A user who has the job to back up data is often called a backup operator; however, company rules may dictate that certain sensitive data files are to be read (opened) only by specific groups with specific permissions. The backup operator does not need to open the file but only to copy it, and he must have the list permission to see filenames to be copied.
You might also like to view...
Which of the following could be an exploit that occurs at the Network layer? (Choose all that apply.)
A. exploits that involve TCP ports B. exploits that involve packet addressing C. exploits that involve routing D. exploits that involve DNS
Case-Based Critical Thinking Question ? Tom has just started working as an office manager for a small pediatric practice. He is responsible for managing the nurses' hotline and presenting trends in call types to his boss each month. He uses Microsoft PowerPoint 2016 to create his presentations. Tom is ready to create his first presentation. He starts PowerPoint and sees ____.
A. the Slide Layout dialog box B. the PowerPoint start screen C. a blank slide with the Two Content layout D. a blank slide with the Title Only layout
The statement System.out.printf("%5d", 123456) outputs ___________.
a. 12345 b. 23456 c. 123456 d. 12345.6
On the Detail Gantt chart, slippage lines are ____.
A. to the left of a task bar B. to the right of a task bar C. above a task bar D. below a task bar