Problem
1. What commands are used to manipulate extended file attributes access lists in Unix and Linux systems?
2. What effect do set user and set group permissions have when executing files on Unix and Linux systems?
3. What is the main host firewall program used on Linux systems?