You are concerned about rogue wireless access points being connected to your network. What is the best way to detect and prevent these?
In Unix, the /etc/securetty file is used to identify the secure terminals from where the root can be allowed to log in.
Answer B is incorrect. In Unix, the /etc/ioports file shows which I/O ports are in use at the moment.
Answer A is incorrect. In Unix, the /etc/services file is the configuration file that lists the network services that the system supports.
Answer C is incorrect. In Unix, the /proc/interrupts file is the configuration file that shows the interrupts in use and how many of each
there has been.
Mozell
1 months agoDyan
1 months agoEveline
5 days agoJudy
10 days agoPhillip
20 days agoWillard
1 months agoCristen
1 months agoKirk
10 days agoTom
16 days agoTayna
17 days agoLizette
2 months agoPaola
6 days agoSalome
1 months agoGearldine
1 months agoLorean
2 months agoLucina
3 months agoHoa
3 months ago