A computer is suspected of being compromised by malware. The security analyst examines the computer and finds that a service called Telnet is running and connecting to an external website over port 443. This Telnet service was found by comparing the system's services to the list of standard services on the company's system image. This review process depends on:

A. MAC filtering.
B. System hardening.
C. Rogue machine detection.
D. Baselining.


Ans: D. Baselining.

Computer Science & Information Technology

You might also like to view...

How do you get an array of Pixel objects from a Picture object?

What will be an ideal response?

Computer Science & Information Technology

A ________ relationship is a relationship between tables in which one record in one table has many matching records in a second table, and one record in the related table has many matching records in the first table

A) one-to-many B) one-to-one C) many-to-many D) This doesn't apply to any relationship type.

Computer Science & Information Technology

The class RuntimeException is part of the package java.io.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Storage for automatic local variables is automatically reserved (that is, created) before the program begins its execution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology