A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?
In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.
Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.
Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.
Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each
there has been.
Kandis
2 months agoArgelia
9 days agoCarey
1 months agoLawrence
1 months agoValentin
2 months agoLezlie
8 days agoKallie
12 days agoValene
27 days agoHelene
1 months agoYolando
2 months agoTorie
28 days agoTerrilyn
1 months agoBillye
2 months agoDorathy
2 months agoMaia
2 months agoAngelica
3 months ago