answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
2 years ago
9

For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f

ile be compromised in this case? What are the limitations?
Computers and Technology
1 answer:
jeka942 years ago
8 0

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

You might be interested in
Write a java program that will print out the following pattern 1 12 123 1234 12345
Ilya [14]

Answer:

public class Main {

  public static void main(String[] args)

{

  int n,m;

  int k=5;

  for(n=1;n<=k;n++)

  {

for(m=1;m<=n;m++)

  System.out.print(m);

   System.out.print(" ");

   }

}

}

Explanation:

The solution to this problem is the use of nested loops of an inner and outer loop to generate a half pyramid of numbers, but displayed on the same line so we have a sequence 1 12 123 1234 12345. The outer loop iterates for n=1 to n<=5 and the inner loop that has the print statement prints the integers from for m = 1 to m<=n.

Note that the value k = 5 is hard coded which in some sense is the number of rows, that is the length of iteration of the outer loop.

5 0
2 years ago
The budget process which emphasizes the achievement of goals and competition between alternatives is:
Maslowich

The question has multiple choices;


<span>A) </span>Incremental budgeting.
B) Performance budgeting.
C) Program budgeting.
D) Target based budgeting.


I’d say D is the answer; Target based budgeting


Target based budgeting focuses on the achievement of goals and competition. Prices in Target based budgeting are used as a tool to make or break sales. This method includes researching the markets to decide at what exact price a product will sell.






4 0
2 years ago
A ___________ is an algorithm for which it is computationally infeasible to find either (a) a data object that maps to a pre-spe
Deffense [45]

Answer:

a. cryptographic hash function

Explanation:

A cryptographic hash function is a hash function that is suitable for use in cryptography. It is a mathematical algorithm that maps data of arbitrary size to a bit string of a fixed size and is a one-way function, that is, a function which is practically infeasible to invert.

7 0
2 years ago
Which of the following connects the processor to the chipset and memory on the motherboard? a. Thread b. FSB c. BIOS d. ALU
IRISSAK [1]

Answer:

The correct Answer is (b) FSB

Explanation:

The chipset is the "superglue" that bonds the microprocessor to the rest of the motherboard and so to the rest of the computer. On a computer, it consists of two basic parts -- the Northbridge and the southbridge. All of the numerous modules of the computer communicate with the CPU over the chipset.

The northbridge joins straight to the processor via the front side bus (FSB). A memory controller is situated on the northbridge, which gives the CPU fast access to the memory. The northbridge also attaches to the AGP or PCI Express bus and to the memory himself.

3 0
2 years ago
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
bonufazy [111]

Answer:

Option (B) is the correct answer of this question.

Explanation:

Packet analyzer is a software application or set of infrastructure capable of unencrypted and recording communication that travels through a virtual system of a computer system.A packet analyzer used to detect network activity is recognized as a broadband monitoring system.

A packet analyzer is a code application that is used for monitoring, intercepting, and recording http requests with the help of a virtual interface.

Other options are incorrect because they are not related to the given scenario.

8 0
2 years ago
Other questions:
  • What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
    9·2 answers
  • 7. Test Average and Grade Write a program that asks the user to enter five test scores. The program should display a letter grad
    15·1 answer
  • 3. Choosing a pre-formatted presentation (that already has a design in the slides) is called choosing a ?
    6·1 answer
  • What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?
    9·1 answer
  • You’re trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although
    5·1 answer
  • Given is the array prices with 100 elements(prices[100]). The problem consists of two parts: 1. Find the highest price in the ar
    11·1 answer
  • Adele’s mother owns a Daycare and she wants to learn all about this business, to help her mom and own it one day. Which CTSO sho
    9·1 answer
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • Two middle-order batsmen are compared based on their performance in their previous cricket match.
    7·1 answer
  • Docker is focused on ______ containerization.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!