A rootkit has been discovered on your mission-critical database server. What is the best step to take to return this system to production?
a. Run an antivirus tool.
b. Install an HIDS.
c. Reconstitute it.
d. Apply vendor patches.
Answer: c. Reconstitute it.
Computer Science & Information Technology
You might also like to view...
A(n) ____________ is a method with no body that appears in a base class, and must be overridden in a (non-abstract) derived class.
a. shadow method b. base method c. derived method d. abstract method
Computer Science & Information Technology
Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially called _______.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Why not use JALR to return from the interrupt handler?
What will be an ideal response?
Computer Science & Information Technology
A SELECT statement embedded in the FROM clause is also called a ________.
a. virtual table b. correlation name c. derived table d. view
Computer Science & Information Technology