Which of the following tools can the analyst use to verify the permissions?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A security analyst is investigating a vulnerability In which a default file permission was set incorrectly. The company uses non-credentialed scanning for vulnerability management.

Which of the following tools can the analyst use to verify the permissions?
A . ssh
B . chmod
C . ls
D . setuid
E . nessus
F . nc

Answer: B

Leave a Reply

Your email address will not be published.