GSEC Exam Question 191
Why would someone use port 80 for deployment of unauthorized services?
GSEC Exam Question 192
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to change the startup shell of Maria from bash to tcsh. Which of the following commands will John use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
GSEC Exam Question 193
Which Linux file lists every process that starts at boot time?
GSEC Exam Question 194
What would the following IP tables command do?
IP tables -I INPUT -s 99.23.45.1/32 -j DROP
IP tables -I INPUT -s 99.23.45.1/32 -j DROP
GSEC Exam Question 195
Which of the following choices accurately describes how PGP works when encrypting email?