subject

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. He should designate all the files in the shared folder as execute-only.
B. He should designate all the files in the shared folder as author only by using the chown command.
C. He should designate all the files in the shared folder as client only by using the chgrp command.
D. He should designate all the files in the shared folder as read-only.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 11:00
Describe three characteristics of at-risk drivers. a. b. c. describe three characteristics of safe drivers. a. b. c. describe three driver errors that could cause a collision. a. b. c. how will this information affect you as a driver now and in the future? (2-3 sentences)
Answers: 2
question
Computers and Technology, 23.06.2019 13:30
Best laptops for college [$100-$500 range]?
Answers: 2
question
Computers and Technology, 23.06.2019 14:30
The option enables you to modify a slide element in most presentation applications.
Answers: 2
question
Computers and Technology, 23.06.2019 15:30
The processing of data in a computer involves the interplay between its various hardware components.
Answers: 1
You know the right answer?
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony pl...
Questions
question
Social Studies, 06.05.2020 06:08
question
Mathematics, 06.05.2020 06:08
question
Social Studies, 06.05.2020 06:08
Questions on the website: 13722359