Multiple Choice
A common technique when compromising Linux hosts is to make sure that if it is used as a sniffer, the command __________ is replaced with a modified version that will not show the ________ flag in its
Output. (fill in the blanks)
A) ipconfig, PRMISC
B) ifconfig, SNIFFER=1
C) ipconfig, PROMISC=On
D) ifconfig, PROMISC
Correct Answer:

Verified
Correct Answer:
Verified
Q1: What is the best definition of a
Q2: Onan wants to install a biometric reader
Q3: One of the disadvantages of symmetric key
Q4: An attacker sends email to a domain
Q6: The act of stealing information from a
Q7: Which of the following is the static
Q8: In order to speed up the process
Q9: It is possible to run critical services
Q10: Bill seems to be connected to every
Q11: As a technique, rootkits hide processes and