Question 6

Which of the following is an example of a behavioral-based HID technique?
  • Question 7

    What is the purpose of IP sets?
  • Question 8

    Which command is used to view the access control list of a file?
  • Question 9

    What command is used to update NVTs from the OpenVAS NVT feed?
    (Specify ONLY the command without any path or parameters).
    Solution: openvas-nvt-sync
    Determine whether the given solution is correct?
  • Question 10

    Which permission bit allows a file to be executed?