A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?
In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.
Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.
Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.
Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each
there has been.
Salley
3 months agoMireya
3 months agoHerschel
3 months agoMelissia
4 months agoLeota
4 months agoEden
4 months agoCyndy
4 months agoFrancoise
4 months agoCordie
5 months agoBong
5 months agoElizabeth
5 months agoClare
5 months agoGraham
5 months agoCristy
5 months agoKiley
5 months agoPearlene
5 months agoWilson
5 months agoKandis
10 months agoArgelia
8 months agoCarey
9 months agoLawrence
9 months agoValentin
10 months agoLezlie
8 months agoKallie
9 months agoValene
9 months agoHelene
9 months agoYolando
10 months agoTorie
9 months agoTerrilyn
9 months agoBillye
10 months agoDorathy
10 months agoMaia
11 months agoAngelica
11 months ago