Is3230 Unit 7 Assignment 1 Client

Adrienne Brown Week 4-Lab 7 January 28, 2015 1. What command is used to change directories on a Linux system? Cd/usr 2. What command is used to create a directory named MyDirectory on a Linux system? mkdir 3. With the previous command, where will the directory be created? Coursework Director 4. What command is used to list a directory’s contents on a Linux system in an abbreviated format, without showing permission strings? ls 5. What command is used to list a directory’s contents on a Linux system, including permission strings and other details ? ls -al 6. What command is used to change the owner of a directory named MyDirectory to a user named myuser? Sudo chown/myuser/mydir 7. What permission string is used to indicate that only the owner of a directory may read, write, or execute the contents? dr-wx/ 8. What command is used to change the group owner of a directory named MyDirectory to a group named clients? Chgrp /mydir 9. What command is used to add group read permissions to a directory named MyDirectory?

Unformatted text preview: individuals with a legitimate business need For access. C. All secure computing Facilities that allow visitors must have an access log. What are the two primary causes of access control failure discussed in the chapter? People, Technology Which of the following are types of security breaches? (Select all that apply.) A. System exploits B. DoS attacks Eavesdropping Anything from an organization’s operating system to its choice of Web browser or instant messaging client could be an access point for unauthorized access to the systems. true When should a privacy impact assessment be performed? . During the planning stages of a new system The two most common motives for a security breach are monetary gain and ________. vandalism A security breach can result in criminal penalties as well as fnancial losses . true...
View Full Document

Unformatted text preview: individuals with a legitimate business need For access. C. All secure computing Facilities that allow visitors must have an access log. What are the two primary causes of access control failure discussed in the chapter? People, Technology Which of the following are types of security breaches? (Select all that apply.) A. System exploits B. DoS attacks Eavesdropping Anything from an organization’s operating system to its choice of Web browser or instant messaging client could be an access point for unauthorized access to the systems. true When should a privacy impact assessment be performed? . During the planning stages of a new system The two most common motives for a security breach are monetary gain and ________. vandalism A security breach can result in criminal penalties as well as fnancial losses . true...
View Full Document

Leave a Comment

(0 Comments)

Your email address will not be published. Required fields are marked *