Answer: Rootkit
Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.
Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.
Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .
Thus ,the correct option is rootkit.
Answer:
- Using it
- Selling it
- Giving it to someone.
Explanation:
Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.
If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.
Answer:
Listed below are the few ways Linux Server can be secured
1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.
2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.
3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.
<h2>
Answer:</h2>
Option A: Both POP3 and IMAP keep email on an email server by default.
is the correct answer.
<h2>
Explanation:</h2>
Following points will make the idea of POP3 and IMAP clear:
<h3>POP3:</h3>
- POP3 is the acronym for Post Office Protocol 3.
- POP3 is the method of receiving emails in which the emails received on the app can be downloaded on to the computer by having an internet connection.
- These downloaded emails can be viewed offline whenever needed and managed as well.
- POP3 makes it possible that the storage space of the default server do not run short as the downloaded emails are deleted from the server.
<h3>IMAP:</h3>
- IMAP stands for Internet Message Access Protocol.
- It is the method in which the mails are viewed and managed directly on the internet server instead of downloading them on the computer.
- IMAP makes sure to manage the mails so carefully and timely so that unimportant mails are deleted to make sure that the storage space does not run short.
<h3>
Conclusion:</h3>
So from these points we can make sure that both ways keep emails on email server but POP3 have option to download mails from server while IMAP dont have.
<h2>
I hope it will help you!</h2>