Question 76
Which of the following malicious code can have more than one type of trigger, multiple task capabilities, and can replicate itself in more than one manner?
Question 77
Which of the following tasks can be performed by using netcat utility?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 78
Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 79
Which of the following wireless network security solutions refers to an authentication process in which a user can
connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?
connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?
Question 80
Fill in the blank with the appropriate option to complete the statement below.
You want to block all UDP packets coming to the Linux server using the portsentry utility.
For this, you have to enable the ______ option in the portsentry configuration file.
You want to block all UDP packets coming to the Linux server using the portsentry utility.
For this, you have to enable the ______ option in the portsentry configuration file.