What happens to the permissions on the file named "secret"?


Javier copies a file named "secret" from a folder named "restricted" to a folder named"open". Both folders reside on the same NTFS partition. What happens to the permissionson the file named "secret"?

Which of the following steps is necessary to add a new device driver to a Linux machine?

Which of the following steps is necessary to add a new device driver to a Linux machine?

What should Nora first do to trouble shoot the problem?

Nora is a site administrator for a large e-commerce site. She notices that the site isrunning slower and taking longer to process transactions. What should Nora first do totrouble shoot the problem?

Which command should Ingrid execute to determine whether apache is already installed?

Ingrid is a Red Hat Linux system administrator. She is installing apache on herLinux server. Which command should Ingrid execute to determine whether apacheis already installed?

What can Denise do to learn exactly how the process affects her system?

Denise is the system administrator of a Linux system. She notices that whenever aspecific process is running the performance of the system declines severely. What canDenise do to learn exactly how the process affects her system?


Which command should Nadir enter to ensure that his Perl script will execute securely?

Nadir installed a Perl script in the cgi-bin directory of his Linux system that is runningapache server. NO significant modifications have been made to Apache server. Heaccesses a script named test.cgi via a web browser, but the script does not execute, andApache server returns a 500 […]

Which file should Stephen edit to set the virtual servers attributes?

Stephen has been assigned to install two apache web servers. He only has hardware forone server. So he decides to create a virtual server to host the second site that he willhost. Which file should Stephen edit to set the virtual servers attributes?

Which of the following services is an example of a Mail Transfer Agent (MTA)?

Which of the following services is an example of a Mail Transfer Agent (MTA)?

What should Jim configure his mail server?

Jim is configuring his new mail server but he can’t remember the well-known port forSMTP. What should Jim configure his mail server?

What is the name of process that Frank implemented?

Frank is a system administrator for a large network. His company has a large DNSstructure that he does not want to reveal to outsiders. He alters the SMTP headersof all messages so that his users appear to be sending mails from a different address.What is the name of process that Frank implemented?



Page 1 of 1412345...10...Last »