Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony takewhile usinga peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?

A. ?He should designate all the files in the shared folder as execute-only.
B. ?He should designate all the files in the shared folder as author only by using the chown command.
C. ?He should designate all the files in the shared folder as client only by using the chgrp command.
D. ?He should designate all the files in the shared folder as read-only.

Answer: D

Computer Science & Information Technology

You might also like to view...

Using Word's ________ feature, letters or memos are created by combining two documents

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can only make changes to the data in the fields with the form displayed in ________

Fill in the blank(s) with correct word

Computer Science & Information Technology