When using DH, what keys will Bob use to send an encrypted message to Alice?
You have recently installed a new Linux machine, running Apache as your web server. You are running Novell SuSe Linux, and are going to use YaST to disable some unneeded modules. In the left-hand options of YaST, which section would you choose in order to disable modules for your Apache web server?
You are configuring the security of a service using Xinetd. You wish to add a line to the configuration of the service that grants access during the hours of 6AM to 7PM. Which of the following lines will you need to add to the configuration to achieve this result?
You have recently installed a new Linux machine, running Apache as your web server. You are running Novell SuSe Linux, and are going to use YaST to disable some unneeded modules. In the left-hand options of YaST, which section would you choose in order to disable modules for your Apache web server?
Recently you have had meetings with an organization to design their security policy. There has been some resistance on their board concerning the need for a security policy. To help remove the resistance, you describe the many benefits to having a security policy. Which of the following are the benefits of a security policy?
Currently there are no comments in this discussion, be the first to comment!