A government office wants to secure a few of its Linux systems so that they can only use certain USB devices. After plugging in a USB device, which of the following commands could be used to detect certain identifying information that can be used to only allow that type of USB device?

A. usbdetect
B. modusb
C. lspci
D. lsusb


Answer: D

Computer Science & Information Technology

You might also like to view...

A(n) template usually contains a cohesive set of theme colors, theme fonts, theme effects, and background styles.  _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following describes what happens when you select an action in the Buttons and Forms panel?

A. Events related to that option are listed. B. Security options related to that action are listed. C. Compatible actions are suggested. D. The options associated with the action appear under the selected action.

Computer Science & Information Technology

A(n) ____________________ is an identification system that requires the individual requesting access to provide information that only the authorized user is supposed to know.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

_____ is used to set up applications that require more than one port. When the firewall detects activity on outbound port, it opens the inbound port for a set period.

A. Port triggering B. Port forwarding C. Port mirroring D. Firewall

Computer Science & Information Technology