Which hardening tool can be used to identify if file tempering has occurred?
a. chroot
b. TCP Wrapper
c. Tripwire
d. Logging
ANS: B
You might also like to view...
A socket with an address in the Unix domain
A. can be reached by clients on any Unix machine B. can only be reached by clients on the same machine
Within the change management process, after the need for a change has been identified, a(n) ____ is submitted to the appropriate decision-making body.
A. contingency plan B. incident report C. engagement letter D. change request
Communication systems that rely on start and stop flags or bits to manage data transmission are known as what type of communication?
A. Analog B. Digital C. Synchronous D. Asynchronous
Not proceeding with the activity or system that creates the risk is _________.
Fill in the blank(s) with the appropriate word(s).