Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

2 (a) Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have

2

(a)

Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob to run the file, but not Cathy. Which of the following sets of commands can Alice run that will accomplish this?

Hint: You should probably be running these commands on a Linux machine

Select one or more:

a. chmod 755 temp/runit.sh

b. None of the other options

c. chmod 744 temp/runit.sh setfacl -m u:Bob:rx runit.sh

d. chmod 4744 temp/runit.sh

e. chmod 754 temp/runit.sh chown Alice:Bob temp/runit.sh

f. chmod 755 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh

g. chmod 4744 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh

(b)

Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob and Cathy to run the file as Alice. Which of the following sets of commands can Alice run that will accomplish this?

Hint: You should probably be running these commands on a Linux machine

Select one or more:

a. chmod 4755 temp/runit.sh setfacl -m u:Bob:r temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh

b. chmod 4755 temp/runit.sh

c. chmod 4744 temp/runit.sh setfacl -m u:Bob:rx runit.sh setfacl -m u:Cathy:rx runit.sh

d. None of the other options

e. chmod 4744 temp/runit.sh

(c)

Which of the following is the primary danger associated with using the setuid bit for executables?

Select one:

a. Users you didn't intend to use the program might run the program

b. You must either run the whole program with escalated privileges or without them. There is no going back and forth.

c. Other users can edit the file to do what they want, keeping the setuid bit

d. When exploited, users can get a shell with escalated privileges

image text in transcribed

Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob to run the file, but not Cathy. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 755 temp/runit.sh b. None of the other options C. chmod 744 temp/runit.sh setfacl-m u:Bob:rx runit.sh d. chmod 4744 temp/runit.sh e. chmod 754 temp/runit.sh chown Alice:Bob temp/runit.sh f. chmod 755 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh g. chmod 4744 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob and Cathy to run the file as Alice. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 4755 temp/runit.sh setfacl-m u:Bob:r temp/runit.sh setfaci-m u:Cathy:r temp/runit.sh b. chmod 4755 temp/runit.sh C. chmod 4744 temp/runit.sh setfacl -m u:Bob:rx runit.sh setfacl -m u:Cathy:rx runit.sh d. None of the other options e. chmod 4744 temp/runit.sh Which of the following is the primary danger associated with using the setuid bit for executables? Select one: a. Users you didn't intend to use the program might run the program b. You must either run the whole program with escalated privileges or without them. There is no going back and forth. C. Other users can edit the file to do what they want, keeping the setuid bit d. When exploited, users can get a shell with escalated privileges Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob to run the file, but not Cathy. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 755 temp/runit.sh b. None of the other options C. chmod 744 temp/runit.sh setfacl-m u:Bob:rx runit.sh d. chmod 4744 temp/runit.sh e. chmod 754 temp/runit.sh chown Alice:Bob temp/runit.sh f. chmod 755 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh g. chmod 4744 temp/runit.sh setfacl -m u:Cathy:r temp/runit.sh Alice is the owner an executable bash script, runit.sh in a temp folder on a Linux machine. Alice, Bob, and Cathy all have full permissions to this folder. Alice wants to allow Bob and Cathy to run the file as Alice. Which of the following sets of commands can Alice run that will accomplish this? Hint: You should probably be running these commands on a Linux machine Select one or more: a. chmod 4755 temp/runit.sh setfacl-m u:Bob:r temp/runit.sh setfaci-m u:Cathy:r temp/runit.sh b. chmod 4755 temp/runit.sh C. chmod 4744 temp/runit.sh setfacl -m u:Bob:rx runit.sh setfacl -m u:Cathy:rx runit.sh d. None of the other options e. chmod 4744 temp/runit.sh Which of the following is the primary danger associated with using the setuid bit for executables? Select one: a. Users you didn't intend to use the program might run the program b. You must either run the whole program with escalated privileges or without them. There is no going back and forth. C. Other users can edit the file to do what they want, keeping the setuid bit d. When exploited, users can get a shell with escalated privileges

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Genomes Browsers And Databases Data Mining Tools For Integrated Genomic Databases

Authors: Peter Schattner

1st Edition

0521711320, 978-0521711326

More Books

Students also viewed these Databases questions