1.
Below are the benefits from access permission, EXCEPT
Correct Answer
E. Restricting users not to make the hard disk full
Explanation
Access permissions are used to control the actions that users can perform on files and directories. The benefits of access permissions include restricting users from removing files, modifying files, and viewing the content of files and directories. However, restricting users from making the hard disk full is not a benefit of access permissions. This is because access permissions do not directly control the amount of disk space a user can consume. Disk space management is typically handled through other mechanisms such as quotas or disk usage monitoring tools.
2.
If you want to protect files from deletion, you have to
Correct Answer
C. Change the file's directory write permission
Explanation
To protect files from deletion, you need to change the file's directory write permission. By changing the directory write permission, you can prevent users from modifying or deleting files within that directory. This means that even if someone has write permission for the file itself, they will not be able to delete it if they do not have write permission for the directory it is located in. This adds an extra layer of security and helps to safeguard important files from accidental or unauthorized deletion.
3.
If you want to protect files from content modifications, you have to
Correct Answer
A. Change the file write permission
Explanation
To protect files from content modifications, you need to change the file write permission. By changing the write permission, you can restrict the ability to modify the file's content. This ensures that unauthorized users or malicious software cannot make any changes to the file, maintaining its integrity and preventing any unwanted modifications. Changing the file read permission or the permissions of the file's directory will not directly protect the file from content modifications.
4.
If you want to restrict users from directory content listing, you have to
Correct Answer
D. Change the directory read permission
Explanation
To restrict users from directory content listing, you need to change the directory read permission. By changing the directory read permission, you are preventing users from accessing the contents of the directory, including file names and metadata. This ensures that users cannot view or list the files and directories within the specified directory. Changing the file write permission, file read permission, or directory write permission alone will not prevent directory content listing.
5.
The command to restrict user not to delete finance.doc within directory /home/budi
Correct Answer
D. Chmod -w /home/budi
Explanation
The correct answer is "chmod -w /home/budi". This command removes the write permission for the directory "/home/budi", which means that users will not be able to delete the file "finance.doc" within that directory. The other commands either change the write permission for the file itself or for the entire directory, but they do not specifically restrict the deletion of "finance.doc" within "/home/budi".
6.
Chmod 644 finance.doc644 equals to
Correct Answer
D. Rw- r-- r--
Explanation
The command "chmod 644 finance.doc" sets the permissions of the file "finance.doc" to read and write for the owner, and read-only for the group and others. In the given answer, "rw- r-- r--", the first three characters "rw-" represent the permissions for the owner (read and write), the next three characters "r--" represent the permissions for the group (read-only), and the last three characters "---" represent the permissions for others (no access).
7.
Chmod u+s /usr/sbin/trackdataWhat is the "s" mean?
Correct Answer
C. Suid
Explanation
The "s" in the command "chmod u+s /usr/sbin/trackdata" stands for "suid," which is short for Set User ID. When the suid permission is set on an executable file, the file will run with the permissions of the file owner instead of the user who is executing it. This can be useful in situations where certain privileges or access levels are required to perform a specific task, allowing users to execute the file with elevated permissions without needing to have those permissions themselves.
8.
Chmod 4755 /usr/sbin/trackdata4755 equals to
Correct Answer
D. Rws r-x r-x
Explanation
The correct answer is "rws r-x r-x". The "chmod 4755" command sets the permissions of the file "/usr/sbin/trackdata" to "rws r-x r-x". The "rws" indicates that the file has the setuid permission, which allows users to execute the file with the permissions of the file's owner. The "r-x r-x" indicates that the file's owner has read and execute permissions, while other users have only execute permissions.
9.
The difference between "x" permission in file and directory, is
Correct Answer
C. Enter permission in directory, execute permission in file
Explanation
The correct answer is "enter permission in directory, execute permission in file". This means that for a directory, the "x" permission allows a user to enter (i.e., access) the directory, while for a file, the "x" permission allows a user to execute (i.e., run) the file.
10.
What happen if I run this command:umask 26
Correct Answer
D. Default directory mode creation become rwx r-x --x
Explanation
Running the command "umask 26" sets the default file and directory creation permissions. The umask command is used to modify the default permissions for newly created files and directories. In this case, the umask value of 26 is being set. The umask value is subtracted from the default permissions, so the resulting file mode creation becomes 644 (666 - 26) and the resulting directory mode creation becomes 755 (777 - 26). The permissions are represented as rwx r-x --x, where "r" denotes read permission, "w" denotes write permission, and "x" denotes execute permission.