You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?
In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.
Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.
Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.
Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each
there has been.
Fairy
3 months agoCharlena
3 months agoLucina
3 months agoBeatriz
4 months agoRoyce
4 months agoMeaghan
4 months agoGerald
4 months agoSuzi
4 months agoMarleen
5 months agoGerman
5 months agoDorathy
5 months agoCandida
5 months agoMargarett
5 months agoCarma
5 months agoAlona
5 months agoRebbeca
5 months agoShelton
5 months agoZena
5 months agoWhitley
5 months agoLouvenia
5 months agoMozell
9 months agoDyan
9 months agoEveline
8 months agoJudy
9 months agoPhillip
9 months agoWillard
9 months agoCristen
9 months agoKirk
9 months agoTom
9 months agoTayna
9 months agoLizette
10 months agoPaola
8 months agoSalome
9 months agoGearldine
9 months agoLorean
10 months agoLucina
11 months agoHoa
11 months ago