The security administrator runs an rpm verify command which records the MD5 sum, permissions, and timestamp of each file on the system. The administrator saves this information to a separate server. Which of the following describes the procedure the administrator has performed?

A. Host software base-lining
B. File snapshot collection
C. TPM
D. ROMDB verification


Answer: D. ROMDB verification

Computer Science & Information Technology

You might also like to view...

Which file extension is recommended for webpages?

a. .doc b. .htm c. .docx d. .html e. .txt

Computer Science & Information Technology

Brightness of a picture can be adjusted from the ________ group

A) Adjust B) Arrange C) Styles D) Corrections

Computer Science & Information Technology

The Blender Foundation manages how Blender's development progresses and it's based at the

Blender Institute in Amsterdam, the Netherlands. Indicate whether the statement is true or false

Computer Science & Information Technology

Which technology was designed to be a short range networking technology (up to 10 meters) that could connect different devices together?

What will be an ideal response?

Computer Science & Information Technology