Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file. Which of the following prevented the AppLocker rules from being evaluated? a. A Path rule does not allow software to run from C:\Program Files\. b. The Windows Installer rules are not configured. c. The Executable rules are enforced and not audited. d. The Application Identity service is configured for Manual startup.
Q: The principle known as in access control means that each user should be given only the minimal…
A: The answer is given in the below step
Q: The command to display the word UNIX in quotation marks is: A echo "UNIX" B echo ""UNIX"" C display…
A: Please refer to the following steps for the complete solution of the problem above.
Q: What does . in a pathname represent? In which type of pathname does it normally specified?
A: Represents current directory and is normally specified relative pathname
Q: 1. Explain the following unexpected result: $ whereis date date: /bin/date ... $ echo $PATH…
A: Note: We can only answer one question at a time as per the guidelines. Please resubmit the rest of…
Q: A local user account has the same name as a remote user account on an AAA server, what happens when…
A: The answer for the above question is as follows:
Q: Which of the following scripts can clean out the logs on the system? Question 4 options:…
A: I have given an answer in step 2.
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: The given questions are multiple choice selected question so I can explain in detail below step.
Q: cali duckburg mcduckcorp Figure 1: DNS name tree for Duckburg
A: The answer is
Q: Consider the following access rights of file run.sh -rw-r-r- 1 luk dev 5 May 7 15:08 run.sh 1.…
A: Dear Student, The first digit in the 3digit numeral is to give permission to the file owner, the…
Q: Write the command that can be used to answer the following questions. (Hint: Try eachout on the…
A: Commands used for the given questions: a. The command for the finding the files which contains the…
Q: A user belongs to a group that has full rights on a file called linux.txt, but the user, as the…
A: Answer is given below .
Q: $ ls -l foo --Wx-w---x 1 uli101 users 813 Sep 13 20:30 foo What command line using octal method sets…
A: chmod Command: It is possible to modify a file's permissions using the chmod command. Changes to a…
Q: Which of the following cmdlets can you use to check if the Windows event log is running? a.…
A: Get-Member cmdlets can you use to check if the Windows event log is running.
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: Answer the above question are as follows
Q: Shell programming in Linux and Unix: Experiment with changing your PS1 and PS2 prompt so it is set…
A: Answer A The SunOS command line is used to manipulate files and directories. You type in the file…
Q: BELOW MCQ GIVEN ANSWER CAN BE MORE THAN ONE OPTION. PLEASE PROVIDE CORRECT ANSWERS.…
A: ANSWER C
Q: The Linux operating system is a very popular server OS. A network administrator has to protect the…
A: Program def login(): print("Brute force attempt") username = input("Login:") password =…
Q: What’s the difference between session.save() and session.saveOrUpdate() methods in hibernate
A: SUMMARY: - hence we discussed all the points.
Q: How to remove the item from the cart if the quantity is 0? I have included my code below that I am…
A: //here, it remove the product from card which has 0 quantity$product_id = $_SESSION['product_id'];
Q: Suppose that only file descriptors 1 (stdout), 3 (a read connection from filel ) and 4 (a write…
A: dup(): The dup() system call duplicates an open file descriptor and returns the new file descriptor.…
Q: Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is…
A: This mcq is based on NTFS permissions.
Q: Exercise 1: Please create a script that print “Hello, your name.” • Exercise 2: Please create a…
A: Given: Exercise 1: Please create a script that print “Hello, your name.”Exercise 2: Please create a…
Q: What does the following command do? cat vuln exploit> server
A: The correct answer is d. It concatenates the files vuln and exploit and redirects the output to a…
Q: Linux 7. Use the "uniq -c" command to sort and summarize the total occurrences of sudo access by…
A: Here i write code for linux find the number of sudo access in the given datafile1(assume). i…
Q: The which command _______________.a. can only be used to search for executablesb. searches for a…
A: "Which" command in Linux: The "Which" command in Linux is used to locate the executable files that…
Q: Is each of the following an absolute pathname, a relative pathname, or a simple filename?
A: Multiple questions are asked so the first question will be answered. Please upload another question…
Q: Linux - Ubuntu Create a file named .db in /etc/bind/, this file will contain all the resource…
A: If your domain uses nameservers, one can add a subdomain record to the DNS zone file. Subdomains…
Q: In a short bash script named listdirs.sh that lists the names of the directories (the names only not…
A: Hi, Here is the required bash script: #!/bin/sh # if user has provided an argument, use it as the…
Q: A. COPE is a more relaxed version of BYOD where employees can choose from a list of company-approved…
A: Answer A. False According to the COPE (corporate-owned personally enabled) business model, a company…
Q: When setting permissions on a file, we can give an individual user ownership of a file using which…
A: in linux, When setting permissions on a file, we can give an individual user ownership of a file…
Q: The separator character in your path can vary depending on the operating system. A relative path is…
A: The separator character in your path can vary depending on the operating system. --> True A…
Q: Consider the file scriptfile with the following permissions: rwxr-xr—- Who can run each of the…
A: The, given information is: USER GROUP OTHER $ source scriptfile $…
Q: The root user utilizes the chgrp command to give ownership of a file to another user.What must the…
A: chgrp command chgrp command is used for changing the group ownership of files or directory. Each…
Q: Below is a list of different access right settings. We want to implement shared update of certain…
A: CHOICES: A. Assign Bob ownership to Alice's files, and Alice ownership to Bob's files. If we…
Q: Which of the following is the default permission set for the /root directory? O a. drwxrwxrwx O b.…
A: The default permission for the root directory is as follows:
Q: A fictitious command madeup reads lines of input from the console until the end-of-file (EOF)…
A: Question:
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: As per guidelines I can answer first three sub-parts. I hope you will understand, Thank You.…
Q: Unix operation System : 1) Write a command to count number of user logged on the network ? 2)…
A: The unix commands for the above problem statements are provided below -
Q: In linux in which directory the user passwords are stored in _____________
A: In linux in which directory the user passwords are stored in
Q: A user belongs to a group that has all permissions on a file named linux.txt, but the user, as the…
A: Linux supports a multiuser environment, i.e. more than one user can perform their tasks…
Q: configured as follows: IT (config)#enable secret cisco IT(config)#line con 0…
A: in below we take changes and correct command
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Command will change working directory from /usr/users/joe to /usr is cd directory. As cd command is…
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: In this question we have to answer some of the following UNIX system based questions. Let's answer…
Q: A file has the following permissions: r-- --x-w-. The command chmod 143 would havethe same effect as…
A: Permissions: In Linux operating system, the permissions are represented with the help of notions of…
Q: Use the diagram below for reference. You can assume you are logged in as the user "msaul" and are…
A: According to the information given:- We have to show the absolute path name on the basis of…
Q: What command could you use to list the files in your fileAsst directory, using an absolute path to…
A: As per Q n A guidelines, We can answer up to 4 sub-parts of a question. So, solving till Question 4.…
Q: Unix MCQ: Q. Which of the following is used with access call for checking the owner’s…
A: Q. Which of the following is used with access call for checking the owner’s permissions? a) R_OK b)…
Q: 7- What is the purpose of using the following code? // GET CONNECTION Connection con; try{ con =…
A: EXPLANATION: - Above code is for established a connection to database using odbc driver. A…
Q: Consider the following command line and its output. username: -$ find/-name a.out -print > files…
A: The question is to find the command that kill a job. The answer is given in step 2.
-
Winona has set up AppLocker rules to protect computers on the company network from being infected by malware. Despite this, one of the computers is infected by malware. She identifies that the malware infected the computer when a user ran a malicious .exe file.
Which of the following prevented the AppLocker rules from being evaluated?a. A Path rule does not allow software to run from C:\Program Files\.b. The Windows Installer rules are not configured.c. The Executable rules are enforced and not audited.d. The Application Identity service is configured for Manual startup.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- 1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. .. f. letter.0210 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working directory 3. If the working directory is /home/max with a subdirectory named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. 4. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users…Given the following ls -l output: drw-r-xr-x. 2 root accounting_grp 4096 Jan 28 19:0 accounting/ What is the access permission for the ‘accounting’ folder (directory)? Write the command to change the access permission of the accounting folder (directory), so that the owner can read and execute, and the group and everybody else (world) can only read the file.What does . in a pathname represent? In which type of pathname does it normally specified? Represents current directory and is normally specified relative pathname Represents root and is normally specified in the absolute pathname Represents current directory and is normally specified in the absolute pathname Shell will give an error since . is not a valid directory name If mkdir test command fails, what could be the possible reason(s)? Group of answer choices test directory or file already exists in the current directory Shell is broken, that is, it is not functioning properly Your working directory may be a system directory Could be (a) or (c) If rmdir test command fails, what could be possible reason(s)? Group of answer choices test directory does not exist test directory is not empty or your working directory is in it Could be (a) or (b) test file does not exist What is a hidden file in UNIX? Group of answer choices Any file whose filename starts…
- Shell programming in Linux and Unix: Experiment with changing your PS1 and PS2 prompt so it is set to what you want once you log in. You can also add to your PATH variable and set a CDPATH. A. What file should you modify in your home directory to do this task? B. What command(s) will change the prompts and what command(s) will have that change take effect once you log in?Question #9 Is each of the following an absolute pathname, a relative pathname, or a simple filename? milk_co correspond/business/milk_co /home/max /home/max/literature/promo .. letter.0210 Question #10 Suppose you have a file that is linked to a file owned by another user. How can you ensure that changes to the file are no longer shared? Question #11 If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter? Max gives the command vim letter. Zach gives the command vim draft. Zach changes the date in the opening of the letter to January 31, writes the file, and exits from vim. Max changes the date to February 1, writes the file, and exits from vim. Question #12 What is an inode? What happens to the inode when you move a file within a filesystem? Question #13 The ls –i command displays a filename…The which command _______________.a. can only be used to search for executablesb. searches for a file in all directories, starting from the rootc. is not a valid Linux commandd. searches for a file only in directories that are in the PATH variable
- 1. Explain the following unexpected result:$ whereis datedate: /bin/date ...$ echo $PATH.:/usr/local/bin:/usr/bin:/bin$ cat > dateecho "This is my own version of date."$ ./dateSunday April 14 10:00:49 PDT 2020 2. What are two ways you can execute a shell script when you do not have executepermission for the file containing the script? Can you execute a shellscript if you do not have read permission for the file containing the script? 3. What is the purpose of the PATH variable?a. Set the PATH variable so that it causes the shell to search the followingdirectories in order:• /usr/local/bin• /usr/bin• /bin• /usr/kerberos/bin• The bin directory in your home directory• The working directoryb. If there is a file named doit in /usr/bin and another file with the samename in your ~/bin directory, which one will be executed? (Assume thatyou have execute permission for both files.)c. If your PATH variable is not set to search the working directory, howcan you execute a program located…On servers with Linux operating system, access logs are kept under which of the following directories by default?A) /var/log/B) /var/log/auth/C)/log/D)/log/auth/ Which of the following would an attacker prefer to run operating system-level code with MSSQL?A) MSSQL cannot run code at the operating system level.B) MSSQL agentC) xp_cmdshellD) There are no options. As a network administrator, you want to reduce the attack surface on your systems. Which of the following helps?A) Creating shared folderB) Make sure that only the necessary services are activeC) To record access activitiesD) monitor network traffic Which of the following products can an institution prefer to use if its antivirus software is up-to-date on the computers in its network?A) FirewallB) DLPC) Web ProxyD) NAC When John enters the mobile banking app on his smartphone, he sees his account balance is decreasing. What would it be better for John to do first to fix this situation?A) Closing and reopening the mobile…Below is a list of different access right settings. We want to implement shared update of certain files between Bob and Alice, but with no one else. Which of the following settings achieve this? Select all that apply. A. Assign Bob ownership to Alice's files, and Alice ownership to Bob's files. B. Put Bob and Alice is a user group, and give the group RWX access to the shared files. C. Use Windows basic file sharing and make Bob and Alice co-owners of the files. D. Set world access of the shared files to RWX.
- You have set up a user group named Accounting and have put all employees in the Accounting department in this group, which has been given permission to use the Financial folder on a file server. You are now asked to create a subfolder under Financial named Payroll. Megan, the payroll officer, is the only employee in the Accounting department allowed to access this folder. What is the best way to configure the new share? a. Assign Megan read/write permissions to the Payroll folder, and explain to your boss that it is not a best practice to give only one employee access to an important folder. b. Assign Megan read/write permissions to the Payroll folder. c. Create a new user group named Payroll, put Megan in the group, and assign the group read/write permissions to the Payroll folder. d. Ask your boss to allow you to put the folder outside of the Financial folder so you can assign a new user group read/write permissions to this folder that will not conflict with the Accounting user group.Write the command that can be used to answer the following questions. (Hint: Try eachout on the system to check your results.)a. Find all files on the system that have the word “test” as part of their filename.b. Search the PATH variable for the pathname to the awk command.c. Find all files in the /usr directory and subdirectories that are larger than 50 kilobytesin size.d. Find all files in the /usr directory and subdirectories that are less than 70 kilobytesin size.e. Find all files in the / directory and subdirectories that are symbolic links.f. Find all files in the /var directory and subdirectories that were accessed less than60 minutes ago.g. Find all files in the /var directory and subdirectories that were accessed less than sixdays ago.h. Find all files in the /home directory and subdirectories that are empty.i. Find all files in the /etc directory and subdirectories that are owned by the groupbin.Please write down the Linux command for each question. 17.1 What command should be used to change the read, write and execute permission of a file? 17.2 The command for a user wants to delete recursively all files and subdirectory from current directory is 17.3 What is the command which edits the scheduler for automatic command executions at background? 17.4 This command let a user check the names of the groups that this a/c belongs to. 17.5 What do we expect to see if running “$ echo `expr 2 \*3`? 17.6 Upon booting up the OS, the latest kernel initialization daemon process that the Ubuntu distribution is using today is ____ 17 Like to find files with “.sh” extensions from current local directory to all its subdirectories, what is the command? 17.8 What is the command to find the IP address of a network card? 17.9 What is usually written on the first line in shell scripts? 17.10 Like to backup all files and subdirectories under /var/www, the output file name is today.tar. The…