During a Linux security audit at a local college, it was noted that members of the dean's group were able to modify employee records in addition to modifying student records, resulting in an audit exception. The college security policy states that the dean's group should only have the ability to modify student records. Assuming that the correct user and group ownerships are in place, which of the following sets of permissions should have been assigned to the directories containing the employee records?

A. R-x---rwx
B. Rwxrwxrwx
C. Rwx----wx
D. Rwxrwxr—

Answer: B. Rwxrwxrwx

Computer Science & Information Technology

You might also like to view...

What is one of the easiest ways to activate Bluetooth on a mobile computer?

A) Enable using Device Manager. B) Use the function key. C) Reboot the mobile device. D) Tilt the monitor screen to a more vertical position.

Computer Science & Information Technology

To test whether an input value falls within a given range, use a(n) ____________________ control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology