Skip to main navigationSkip to main contentSkip to footer
Wiki Cram
  • Home
  • Blog
Wiki Cram

Author: Anonymous (page 29,619)

Which of the following Unix permission strings indicates tha…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
Which of the following Unix permission strings indicates that the file’s user owner has permission to read and write the file?
Continue reading “Which of the following Unix permission strings indicates tha…”…

Typically the systems in the _________ require or provide ex…

Posted on: August 5, 2025 Last updated on: August 5, 2025 Written by: Anonymous
Typically the systems in the _________ require or provide external connectivity, such as a corporate Web server, an e-mail server, or a DNS server.
Continue reading “Typically the systems in the _________ require or provide ex…”…

Which of the following is NOT one of the three types of reso…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
Which of the following is NOT one of the three types of resources that a denial-of-service attack may attempt to exhaust?
Continue reading “Which of the following is NOT one of the three types of reso…”…

To disguise the origin of a packet used in a denial-of-servi…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
To disguise the origin of a packet used in a denial-of-service attack, attackers often change the value of the _____________________ field in the IP header.
Continue reading “To disguise the origin of a packet used in a denial-of-servi…”…

Once it infects a system, a __________ is very hard to detec…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
Once it infects a system, a __________ is very hard to detect, because it installs itself at a low level.
Continue reading “Once it infects a system, a __________ is very hard to detec…”…

A __________ virus uses scripting code, typically embedded i…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
A __________ virus uses scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents.
Continue reading “A __________ virus uses scripting code, typically embedded i…”…

Which of the following stages of hardening an OS should be d…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
Which of the following stages of hardening an OS should be done before the others?
Continue reading “Which of the following stages of hardening an OS should be d…”…

A fixed pattern of bytes that anti-virus uses to identify a…

Posted on: August 5, 2025 Last updated on: August 5, 2025 Written by: Anonymous
A fixed pattern of bytes that anti-virus uses to identify a known piece of malware is called a(n) _______________.
Continue reading “A fixed pattern of bytes that anti-virus uses to identify a…”…

A firewall can protect against attacks that bypass the firew…

Posted on: August 5, 2025 Last updated on: August 5, 2025 Written by: Anonymous
A firewall can protect against attacks that bypass the firewall.
Continue reading “A firewall can protect against attacks that bypass the firew…”…

A defensive technology used in Unix-based systems such as BS…

Posted on: August 5, 2025 Last updated on: December 7, 2025 Written by: Anonymous
A defensive technology used in Unix-based systems such as BSD and Linux, which restricts a particular application’s view of the filesystem to a specified portion, is called __________.
Continue reading “A defensive technology used in Unix-based systems such as BS…”…
« Previous page 1 … 29,617 29,618 29,619 29,620 29,621 … 84,311 Next page »
Powered by Studyeffect
  • Privacy Policy
  • Terms of Service
Copyright © 2026 WIKI CRAM — Powered by NanoSpace