Question 6
Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for
Harold? needs?
Harold? needs?
Question 7
Where is the default location for Apache access logs on a Linux computer?
Question 8
Amelia has got an email from a well-reputed company stating in the subject line that she has won a prize money, whereas the email body says that she has to pay a certain amount for being eligible for the contest. Which of the following acts does the email breach?
Question 9
Which of the following is a MAC-based File Recovery Tool?
Question 10
An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security policy, including unauthorized access, as well as misuse.
Which of the following intrusion detection systems audit events that occur on a specific host?
Which of the following intrusion detection systems audit events that occur on a specific host?
