At what hard link count is a file effectively deleted?
a. -1 b. 0
c. 1 d. 2
ANSWER: b
Computer Science & Information Technology
You might also like to view...
Which choice is not a description of a control?
A. Detective controls uncover attacks and prompt the action of preventative or corrective controls. B. Corrective controls always reduce the likelihood of a premeditated attack. C. Controls reduce the effect of an attack. D. Controls perform as the countermeasures for threats.
Computer Science & Information Technology
Newer Trojans listen at a predetermined port on the target computer so that detection is more difficult.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology