?Match each term with the correct statement below.
A. ?A measure of normal system activity.
B. ?An attack in which a network service is altered in memory
C. ?The connections that a program makes to files on a filesystem.
D. A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.?
E. ?A program that can be used to detect unauthorized access to a Linux system.
F. ?A command that lists the files that are currently being viewed or modified by software programs and users.
G. ?A command that can be used to scan ports on network computers.
H. ?A software program that can be used to automatically authenticate users using their private key.
I. ?The process of embedding network packets within other network packets.
J. A common IDS for Linux that monitors files and directories.?
A. ?baseline
B. buffer overrun?
C. ?file handles
D. ?firewall daemon (firewalld)
E. ?Intrusion Detection System (IDS)
F. ?lsof command
G. ?nmap command
H. ?SSH agent
I. ?tunneling
J. tripwire
You might also like to view...
Alicia wants a database to open using the frmNavigation object only. To do this, she must disable the ____ option from Backstage View using Options and the Current Database.
A. Allow Full Menus B. Display Navigation Pane C. Display Navigation Form D. Enable error checking
When windows are tiled, clicking anywhere in an inactive program window activates it so you can work in the window.
Answer the following statement true (T) or false (F)
Each child element may contain children of its own and so forth down the hierarchy, creating a set of _____ elements that are all descended from a common parent.?
A. ?descendant B. ?child C. parent D. ?sibling
Which wireless technologies are used with input and output devices?
A. WiMAX B. satellite C. IR D. NFC E. BigFoot F. Bluetooth G. Radio H. Sirius