MCQs
Total Questions : 69
| Page 3 of 7 pages
Answer: Option D. -> TBONE
None.
Answer: Option B. -> It intended to reduce the risks inherent in exchanging keys
None.
Answer: Option B. -> It creates a small,fixed block of data
None.
Answer: Option D. -> All of the mentioned
None.
Answer: Option C. -> Grant limited permission to specified account
limited access is a key method to circumvent unauthorized access and exploits.
Answer: Option C. -> Stop
None.
Answer: Option B. -> File sharing and permission
Sharing and associated permissions are usual exploits which can compromised the system.
Answer: Option D. -> Using telnet and FTP for remote access.
Telnet and FTP are not encrypted and can be compromised.