A group of system administrators were discussing file permissions and decided that setting a particular root-owned text file to read-only for everyone is a best practice. What do the permissions for this file look like? (choose 2)
A. 777
B. rwxrw-r-x
C. rw-rw-r--
D. 664
Answer:
C. rw-rw-r--
D. 664
Computer Science & Information Technology
You might also like to view...
Block style is synonymous with ________ style
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ____ constraint is the default constraint for tasks entered into a project with an assigned Finish date.
A. Finish No Later Than B. As Soon As Possible C. Start No Earlier Than D. None of the above
Computer Science & Information Technology
What are the four types of packets used by EAP?
What will be an ideal response?
Computer Science & Information Technology
Describe the two most common forms of DSL.
What will be an ideal response?
Computer Science & Information Technology