GSEC Exam Question 176
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You have created a folder named Report. You have made David the owner of the folder. The members of a group named JAdmin can access the folder and have Read, Write, and Execute permissions. No other user can access the folder. You want to ensure that the members of the JAdmin group do not have Write permission on the folder. Also, you want other users to have Read permission on the Report folder.
Which of the following commands will you use to accomplish the task?
Which of the following commands will you use to accomplish the task?
GSEC Exam Question 177
Which of the following tools is used to configure, control, and query the TCP/IP network interface parameters?
GSEC Exam Question 178
You work as a Network Administrator for Tech Perfect Inc. The company has a Linux-based network. You want to kill a process running on a Linux server. Which of the following commands will you use to know the process identification number (PID) of the process?
GSEC Exam Question 179
Which of the following monitors program activities and modifies malicious activities on a system?