Which hardening tool can be used to identify if file tempering has occurred?

a. chroot
b. TCP Wrapper
c. Tripwire
d. Logging


ANS: B

Computer Science & Information Technology

You might also like to view...

A socket with an address in the Unix domain

A. can be reached by clients on any Unix machine B. can only be reached by clients on the same machine

Computer Science & Information Technology

Within the change management process, after the need for a change has been identified, a(n) ____ is submitted to the appropriate decision-making body.

A. contingency plan B. incident report C. engagement letter D. change request

Computer Science & Information Technology

Communication systems that rely on start and stop flags or bits to manage data transmission are known as what type of communication?

A. Analog B. Digital C. Synchronous D. Asynchronous

Computer Science & Information Technology

Not proceeding with the activity or system that creates the risk is _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology