A group of system administrators were discussing file permissions and decided that setting a particular root-owned text file to read-only for everyone is a best practice. What do the permissions for this file look like? (choose 2)

A. 777
B. rwxrw-r-x
C. rw-rw-r--
D. 664


Answer: 

C. rw-rw-r--
D. 664

Computer Science & Information Technology

You might also like to view...

Block style is synonymous with ________ style

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____ constraint is the default constraint for tasks entered into a project with an assigned Finish date.

A. Finish No Later Than B. As Soon As Possible C. Start No Earlier Than D. None of the above

Computer Science & Information Technology

What are the four types of packets used by EAP?

What will be an ideal response?

Computer Science & Information Technology

Describe the two most common forms of DSL.

What will be an ideal response?

Computer Science & Information Technology