You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What should you do?
A. use the runas command
B. preface the command with sudo
C. run the command followed by /root
D. type superuser and then the command
Answer: B
You might also like to view...
A Trojan horse embeds itself within another program or file, and when that program or file is activated, it copies itself and attacks other files on the system. _________________________
Answer the following statement true (T) or false (F)
What do you do to convert a corner point to a smooth point?
What will be an ideal response?
In the WPA personal security model, the wireless device has two keys, a 128-bit encryption key called the ____ key and a 64-bit MIC.
A. per-packet B. temporal C. CRC D. TKIP
Which test ensures data accuracy by the incorporation of a number in the code itself?
What will be an ideal response?