00:00

QUESTION 16

Which of the following is referred to as Electromagnetic Interference (EMI)?

Correct Answer: A

QUESTION 17

Which of the following is a benefit of using John the Ripper for auditing passwords?

Correct Answer: C

QUESTION 18

Which aspect of UNIX systems was process accounting originally developed for?

Correct Answer: C

QUESTION 19

A sensor that uses a light beam and a detecting plate to alarm if the light beam is obstructed is most commonly used to identify which of the following threats?

Correct Answer: B

QUESTION 20

You work as a Network Administrator for Net World Inc. The company has a Linux-based network. For testing purposes, you have configured a default IP-table with several filtering rules. You want to reconfigure the table. For this, you decide to remove the rules from all the chains in the table. Which of the following commands will you use?

Correct Answer: D