At what hard link count is a file effectively deleted?

a. -1 b. 0
c. 1 d. 2

ANSWER: b

Computer Science & Information Technology

You might also like to view...

Which choice is not a description of a control?

A. Detective controls uncover attacks and prompt the action of preventative or corrective controls. B. Corrective controls always reduce the likelihood of a premeditated attack. C. Controls reduce the effect of an attack. D. Controls perform as the countermeasures for threats.

Computer Science & Information Technology

Newer Trojans listen at a predetermined port on the target computer so that detection is more difficult.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology