Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?
A) He should designate all the files in the shared folder as execute-only.
B) He should designate all the files in the shared folder as author only by using the chown command.
C) He should designate all the files in the shared folder as client only by using the chgrp command.
D) He should designate all the files in the shared folder as read-only.
Correct Answer:
Verified
Q28: Identify a protocol that is used to
Q29: The accompanying figure represents _. Q30: Which of the following statements is true Q31: In the accompanying figure, data is represented Q32: Most networking media send data using _ Q34: Which of the following ranges of the Q35: Which of the following is an advantage Q36: Identify a method of data transmission used Q37: Laura, a network administrator, is in charge Q38: Jerry sets up a small network consisting
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents