Which of the following is referred to as Electromagnetic Interference (EMI)?
Correct Answer:
A
Which of the following is a benefit of using John the Ripper for auditing passwords?
Correct Answer:
C
Which aspect of UNIX systems was process accounting originally developed for?
Correct Answer:
C
A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?
Correct Answer:
B
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. For testing purposes, you have configured a default IP-table with several filtering rules. You want to reconfigure the table. For this, you decide to remove the rules from all the chains in the table. Which of the following commands will you use?
Correct Answer:
D