During a Linux security audit at a local college, it was noted that members of the dean's group were able to modify employee records in addition to modifying student records, resulting in an audit exception. The college security policy states that the dean's group should only have the ability to modify student records. Assuming that the correct user and group ownerships are in place, which of the following sets of permissions should have been assigned to the directories containing the employee records?
A. R-x---rwx
B. Rwxrwxrwx
C. Rwx----wx
D. Rwxrwxr—
Answer: B. Rwxrwxrwx
You might also like to view...
Which of the following statements is preferred to create a string "Welcome to Java"?
a. String s = "Welcome to Java"; b. String s = new String("Welcome to Java"); c. String s; s = "Welcome to Java"; d. String s; s = new String("Welcome to Java");
Pointers are simply ____ that are used to store the addresses of other variables.
A. prototypes B. data types C. variables D. addresses
Blue arrows called ____________________ point from cells that might have caused the error to the active cell containing the error.
Fill in the blank(s) with the appropriate word(s).
Amazon SWF is designed to help users...
A. Design graphical user interface interactions B. Manage user identification and authorization C. Store Web content D. Coordinate synchronous and asynchronous tasks which are distributed and fault tolerant.