On a UNIX host, you should run a ____ check, a set of software programs that makes sure any software you're running on your system is a trusted program.

A. Security Assessment Tool
B. Baseline Security Analyzer
C. Trusted Computing Base
D. security_patch_check


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is the drop-frame timecode format?

A. 00:00:00:00 B. 00;00;00;00 C. 00,00,00,00 D. 00.00.00.00

Computer Science & Information Technology

Which of the following is a Flash video format?

A. .ogv B. .vp8 C. .f4v D. .mov

Computer Science & Information Technology

Letters and memos are typically designed in ________ orientation

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is a valid step that should be taken to make using iSCSI technology on a network more secure?

A. The iSCSI traffic should be encrypted using CHAP. B. The iSCSI traffic should be isolated to a dedicated and separate network. C. The network should make use of hardware based iSCSI instead of software based iSCSI. D. The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.

Computer Science & Information Technology