An administrator is assigning custom permissions to a user who will back up a system. Using the principle of least permissions, which of the following permissions is needed by the user to perform this task?

a. Modify
b. Read & Execute
c. Write
d. List Folder Contents

D. A user who has the job to back up data is often called a backup operator; however, company rules may dictate that certain sensitive data files are to be read (opened) only by specific groups with specific permissions. The backup operator does not need to open the file but only to copy it, and he must have the list permission to see filenames to be copied.

Computer Science & Information Technology

You might also like to view...

(Prime Numbers) Modify Exercise 21.13 so that, if the number the user inputs into the pro- gram is not prime, the program displays the prime factors of the number and the number of times each prime factor appears in the unique prime factorization. For example, the output for the num- ber 54 should be The unique prime factorization of 54 is: 2 * 3 * 3 * 3

What will be an ideal response?

Computer Science & Information Technology

Media ___________________ can detect the resolution of a device on which a webpage is being viewed, and then apply styles specified for that resolution.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology