During a security assessment, a security analyst finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permissions for the existing users and groups and remove the set-user-ID bit from the file?
chipdomcobb
Highly Voted 2 years, 8 months agoLordJaraxxus
Most Recent 1 year, 3 months agosujon_london
1 year, 10 months agosujon_london
1 year, 10 months agoApplebeesWaiter1122
1 year, 11 months agoSophyQueenCR82
2 years, 3 months agoKnowledge33
2 years, 7 months ago