On a UNIX host, you should run a ____ check, a set of software programs that makes sure any software you're running on your system is a trusted program.
A. Security Assessment Tool
B. Baseline Security Analyzer
C. Trusted Computing Base
D. security_patch_check
Answer: C
You might also like to view...
Which of the following is the drop-frame timecode format?
A. 00:00:00:00 B. 00;00;00;00 C. 00,00,00,00 D. 00.00.00.00
Which of the following is a Flash video format?
A. .ogv B. .vp8 C. .f4v D. .mov
Letters and memos are typically designed in ________ orientation
Fill in the blank(s) with correct word
What is a valid step that should be taken to make using iSCSI technology on a network more secure?
A. The iSCSI traffic should be encrypted using CHAP. B. The iSCSI traffic should be isolated to a dedicated and separate network. C. The network should make use of hardware based iSCSI instead of software based iSCSI. D. The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.