You have recently installed a new Linux machine, running Apache as your web server. You are running Novell SuSe Linux, and are going to use YaST to disable some unneeded modules. In the left-hand options of YaST, which section would you choose in order to disable modules for your Apache web server?
What type of an attack would someone be using if they sent a packet to their target with identical source and destination IP address and port (which is the address of the target machine) which can cause a system to go into an infinite loop trying to complete a connection?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like access to a file, folder, or printer, which of the following options would you use?
What type of an attack would someone be using if they sent a packet to their target with identical source and destination IP address and port (which is the address of the target machine) which can cause a system to go into an infinite loop trying to complete a connection?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system, if you wish to audit events like access to a file, folder, or printer, which of the following options would you use?
Submit Cancel