Question
2 (a) Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have
2
(a)
Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob to run the file, but not Cathy. Which of the following sets of commands can Alice run that will accomplish this?
Hint: You should probably be running these commands on a Linux machine
Select one or more:
a. chmod 755 temp/runit.sh
b. None of the other options
c. chmod 744 temp/runit.sh setfacl -m u:Bob:rx runit.sh
d. chmod 4744 temp/runit.sh
e. chmod 754 temp/runit.sh chown Alice:Bob temp/runit.sh
f. chmod 755 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh
g. chmod 4744 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh
(b)
Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob and Cathy to run the file as Alice. Which of the following sets of commands can Alice run that will accomplish this?
Hint: You should probably be running these commands on a Linux machine
Select one or more:
a. chmod 4755 temp/runit.sh setfacl -m u:Bob:r temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh
b. chmod 4755 temp/runit.sh
c. chmod 4744 temp/runit.sh setfacl -m u:Bob:rx runit.sh setfacl -m u:Cathy:rx runit.sh
d. None of the other options
e. chmod 4744 temp/runit.sh
(c)
Which of the following is the primary danger associated with using the setuid bit for executables?
Select one:
a. Users you didn't intend to use the program might run the program
b. You must either run the whole program with escalated privileges or without them. There is no going back and forth.
c. Other users can edit the file to do what they want, keeping the setuid bit
d. When exploited, users can get a shell with escalated privileges
Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob to run the file, but not Cathy. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 755 temp/runit.sh b. None of the other options C. chmod 744 temp/runit.sh setfacl-m u:Bob:rx runit.sh d. chmod 4744 temp/runit.sh e. chmod 754 temp/runit.sh chown Alice:Bob temp/runit.sh f. chmod 755 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh g. chmod 4744 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob and Cathy to run the file as Alice. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 4755 temp/runit.sh setfacl-m u:Bob:r temp/runit.sh setfaci-m u:Cathy:r temp/runit.sh b. chmod 4755 temp/runit.sh C. chmod 4744 temp/runit.sh setfacl -m u:Bob:rx runit.sh setfacl -m u:Cathy:rx runit.sh d. None of the other options e. chmod 4744 temp/runit.sh Which of the following is the primary danger associated with using the setuid bit for executables? Select one: a. Users you didn't intend to use the program might run the program b. You must either run the whole program with escalated privileges or without them. There is no going back and forth. C. Other users can edit the file to do what they want, keeping the setuid bit d. When exploited, users can get a shell with escalated privileges Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob to run the file, but not Cathy. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 755 temp/runit.sh b. None of the other options C. chmod 744 temp/runit.sh setfacl-m u:Bob:rx runit.sh d. chmod 4744 temp/runit.sh e. chmod 754 temp/runit.sh chown Alice:Bob temp/runit.sh f. chmod 755 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh g. chmod 4744 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob and Cathy to run the file as Alice. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 4755 temp/runit.sh setfacl-m u:Bob:r temp/runit.sh setfaci-m u:Cathy:r temp/runit.sh b. chmod 4755 temp/runit.sh C. chmod 4744 temp/runit.sh setfacl -m u:Bob:rx runit.sh setfacl -m u:Cathy:rx runit.sh d. None of the other options e. chmod 4744 temp/runit.sh Which of the following is the primary danger associated with using the setuid bit for executables? Select one: a. Users you didn't intend to use the program might run the program b. You must either run the whole program with escalated privileges or without them. There is no going back and forth. C. Other users can edit the file to do what they want, keeping the setuid bit d. When exploited, users can get a shell with escalated privilegesStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started