?What two special permissions can be applied in order to effectively allow a user to become owner of a file, or become a member of a group, by executing a file?
A. ?sticky bit
B. ?SUID
C. ?SGID
D. ?SQUID
Answer:
B. ?SUID
C. ?SGID
Computer Science & Information Technology
You might also like to view...
One approach to constructing a MAC is to use a symmetric block cipher in such a way that it produces a __________ output for a variable length input.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
How would you turn off DMA (direct memory access) for all disk control- lers when you install a new system?
What will be an ideal response?
Computer Science & Information Technology
Wikipedia is a good reference for a research paper
Indicate whether the statement is true or false
Computer Science & Information Technology
A person who drafts an original document is known as the originator
Indicate whether the statement is true or false
Computer Science & Information Technology