A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?
A. usbdetect
B. modusb
C. lspci
D. lsusb
Answer: D
You might also like to view...
A(n) template usually contains a cohesive set of theme colors, theme fonts, theme effects, and background styles. _________________________
Answer the following statement true (T) or false (F)
Which of the following describes what happens when you select an action in the Buttons and Forms panel?
A. Events related to that option are listed. B. Security options related to that action are listed. C. Compatible actions are suggested. D. The options associated with the action appear under the selected action.
A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.
Fill in the blank(s) with the appropriate word(s).
_____ is used to set up applications that require more than one port. When the firewall detects activity on outbound port, it opens the inbound port for a set period.
A. Port triggering B. Port forwarding C. Port mirroring D. Firewall