Multiple Choice
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?
A) He should designate all the files in the shared folder as execute-only.
B) He should designate all the files in the shared folder as author only by using the chown command.
C) He should designate all the files in the shared folder as client only by using the chgrp command.
D) He should designate all the files in the shared folder as read-only.
Correct Answer:

Verified
Correct Answer:
Verified
Q59: A single server can act as a
Q60: In the context of network topologies, which
Q61: Case 4-1<br>Michael, the owner of a new
Q62: A(n) _ is a device on a
Q63: A(n) _ is a private, secure path
Q65: The _, embedded instructions, for a router
Q66: A(n) _ is a network that covers
Q67: Briefly describe any of the five communications
Q68: In the accompanying figure, data is represented
Q69: In the accompanying figure of a HomePlug