0
0
Cybersecurityknowledge~20 mins

File permissions and access control in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
File Permissions Mastery
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Basic File Permission Types

Which of the following best describes the write permission on a file in a typical operating system?

AAllows a user to modify or delete the contents of the file.
BAllows a user to execute the file as a program or script.
CAllows a user to view the contents of the file without making changes.
DAllows a user to change the ownership of the file.
Attempts:
2 left
💡 Hint

Think about what it means to be able to change a file's content.

📋 Factual
intermediate
2:00remaining
File Permission Representation in Unix

In Unix-like systems, what does the permission string -rwxr-x--x indicate about the file's access?

AOwner has no permissions; group can read and execute; others can write only.
BOwner can read and write; group can execute only; others have no permissions.
COwner can execute only; group can read and write; others can read only.
DOwner can read, write, execute; group can read and execute; others can execute only.
Attempts:
2 left
💡 Hint

Break down the string into owner, group, and others permissions.

🚀 Application
advanced
2:00remaining
Applying Access Control Lists (ACLs)

A file has standard permissions set to rw-r-----. The owner is Alice, the group is 'staff'. An ACL entry grants user Bob read and write access. What is the effective permission for Bob?

ABob has read and write access due to the ACL entry.
BBob has no access because he is not the owner or in the group.
CBob has read-only access because of the group permissions.
DBob has execute permission only.
Attempts:
2 left
💡 Hint

ACLs can grant specific permissions beyond standard owner/group/others.

🔍 Analysis
advanced
2:00remaining
Analyzing Permission Risks

Which of the following file permission settings poses the greatest security risk on a multi-user system?

AFile permissions set to <code>rw-r-----</code> with owner and group properly assigned.
BFile permissions set to <code>r--r-----</code> with restricted write access.
CFile permissions set to <code>rwxrwxrwx</code> allowing all users full access.
DFile permissions set to <code>rw-r-----</code> but with no execute permission.
Attempts:
2 left
💡 Hint

Consider what happens when everyone can read, write, and execute a file.

Reasoning
expert
2:00remaining
Determining Effective Permissions with Multiple Groups

User Charlie belongs to groups 'dev' and 'qa'. A file has owner 'Alice', group 'dev', and permissions rw-r-----. The 'qa' group has an ACL entry granting read access to the file. What is Charlie's effective permission?

ACharlie has execute permission due to group membership.
BCharlie has read-only access because of the ACL entry for 'qa' group.
CCharlie has no access because only the owner has write permission.
DCharlie has read and write access because he is in the 'dev' group.
Attempts:
2 left
💡 Hint

Consider how ACLs and group memberships combine to determine access.