Hey here is answer to your question.
In case of any doubt comment below. Please UPVOTE if you Liked the answer.
1. B and C
2. A (RPM from red hat ) and D (dpkg ubuntu/debian)
3. A and B
UNIX operating systems 1) Which of the following below are metapackage management systems (select all that...
Which of the following are files according to Linux? Select all that apply. Select one or more: a. Named pipes b. Regular files. c. Directories d. UIDs
answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE): a)true b)false 2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE): a)true b)false. 3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE): a)true b)false 4)the wireless access point provides a connection to the network or service(SELECT ONE): a)true b)false 5)blocking ICMP packets may...
1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...