?What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?

A. ?sticky bit
B. ?SUID
C. ?SGID
D. ?SQUID


Answer:
B. ?SUID
C. ?SGID

Computer Science & Information Technology

You might also like to view...

One approach to constructing a MAC is to use a symmetric block cipher in such a way that it produces a __________ output for a variable length input.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How would you turn off DMA (direct memory access) for all disk control- lers when you install a new system?

What will be an ideal response?

Computer Science & Information Technology

Wikipedia is a good reference for a research paper

Indicate whether the statement is true or false

Computer Science & Information Technology

A person who drafts an original document is known as the originator

Indicate whether the statement is true or false

Computer Science & Information Technology