Discuss how you can set the SUID bit and the GUID bit.

What will be an ideal response?


You set the SUID bit with chmod, using one of the following:
•  Permissions of the owning user (such as chmod u+s /usr/bin/passwd)
•  Numerically (such as chmod 4755 /usr/bin/passwd)
Each user is allowed to change his password, but root permissions are needed to write it into the /etc/shadow file.
You set the SGID bit with chmod, using one of the following:
•  Permissions of the group (such as chmod g+s /tmp)
•  Numerically (such as chmod 2777 /directory)

Computer Science & Information Technology

You might also like to view...

A(n) ________ enables a program to read data from the user.

a. printf. b. import declaration. c. Scanner. d. main.

Computer Science & Information Technology

All digital signatures on documents are visible

Indicate whether the statement is true or false

Computer Science & Information Technology

An important reconciliation in the payroll system is

A. general ledger compares the labor distribution summary from cost accounting to the disbursement voucher from accounts payable B. personnel compares the number of employees authorized to receive a paycheck to the number of paychecks prepared C. production compares the number of hours reported on job tickets to the number of hours reported on time cards D. payroll compares the labor distribution summary to the hours reported on time cards

Computer Science & Information Technology

The process of determining the particular tables and columns that will comprise a database is known as ____.

A. normalization B. database design C. qualification D. relational management

Computer Science & Information Technology