You are configuring an Access Control List (ACL) iscc video
cc video for you are configuring an Access Control List (ACL) for a file on a Linux server. The system administrators should be able to read and modify the
            Question 1
            Be Honest
          
          
        Answer
          Full Certification Question
You are configuring an Access Control List (ACL) for a file on a Linux server. The system administrators should be able to read and modify the file, but not execute it. The developers should be able to read and execute the file, but not modify it. Which of the following ACL setups would best meet these requirements?