You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?
In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.
Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.
Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.
Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each
there has been.
Mozell
1 months agoDyan
1 months agoEveline
6 days agoJudy
11 days agoPhillip
21 days agoWillard
1 months agoCristen
1 months agoKirk
11 days agoTom
17 days agoTayna
18 days agoLizette
2 months agoPaola
7 days agoSalome
1 months agoGearldine
1 months agoLorean
2 months agoLucina
3 months agoHoa
3 months ago