You work as the Network Administrator for Perfect solutions Inc. The company has a Linux- based Network. You are a root user on the Red Hat operating system. You want to grant ownership of the file foofile to a user John. Which of the following commands should you use to accomplish this task?