The security administrator runs an rpm verify command which records the MD5 sum, permissions, and timestamp of each file on the system. The administrator saves this information to a separate server. Which of the following describes the procedure the administrator has performed?
A. Host software base-lining
B. File snapshot collection
C. TPM
D. ROMDB verification
Answer: D. ROMDB verification
Computer Science & Information Technology
You might also like to view...
Which file extension is recommended for webpages?
a. .doc b. .htm c. .docx d. .html e. .txt
Computer Science & Information Technology
Brightness of a picture can be adjusted from the ________ group
A) Adjust B) Arrange C) Styles D) Corrections
Computer Science & Information Technology
The Blender Foundation manages how Blender's development progresses and it's based at the
Blender Institute in Amsterdam, the Netherlands. Indicate whether the statement is true or false
Computer Science & Information Technology
Which technology was designed to be a short range networking technology (up to 10 meters) that could connect different devices together?
What will be an ideal response?
Computer Science & Information Technology