You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?
In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.
Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.
Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.
Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each
there has been.
Mozell
3 months agoDyan
3 months agoEveline
2 months agoJudy
2 months agoPhillip
2 months agoWillard
3 months agoCristen
3 months agoKirk
2 months agoTom
2 months agoTayna
2 months agoLizette
3 months agoPaola
2 months agoSalome
3 months agoGearldine
3 months agoLorean
4 months agoLucina
4 months agoHoa
4 months ago