Question 6
Which of the following is an example of a behavioral-based HID technique?
Question 7
What is the purpose of IP sets?
Question 8
Which command is used to view the access control list of a file?
Question 9
What command is used to update NVTs from the OpenVAS NVT feed?
(Specify ONLY the command without any path or parameters).
Solution: openvas-nvt-sync
Determine whether the given solution is correct?
(Specify ONLY the command without any path or parameters).
Solution: openvas-nvt-sync
Determine whether the given solution is correct?
Question 10
Which permission bit allows a file to be executed?