What kind of program can you use to track changes to files on the server?
You have just installed a new Linux file server at your office. This server is going to be used by
several individuals in the organization, and unauthorized personnel must not be able to modify any
data.
What kind of program can you use to track changes to files on the server?
Which of the following guidelines or standards is associated with the credit card industry?
Which of the following guidelines or standards is associated with the credit card industry?
Which built-in functionality of Linux can achieve this?
Jim’s organization has just completed a major Linux roll out and now all of the organization’s
systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on
purchasing other essential security equipment and software. The organization requires an option
to control network traffic and also perform stateful inspection of traffic going into and out of the
DMZ.
Which built-in functionality of Linux can achieve this?
Which of the attacks below is likely to be used to crack the target file?
An attacker has captured a target file that is encrypted with public key cryptography. Which of
the attacks below is likely to be used to crack the target file?
What library does it use?
WinDump is a popular sniffer which results from the porting to Windows of TcpDump for Linux.
What library does it use?
Which tool can be used to silently copy files from USB devices?
Which tool can be used to silently copy files from USB devices?
They are at odds over what types of encryption are used to secure Linux passwords.(Choose all that apply.
Several of your co-workers are having a discussion over the etc/passwd file. They are at odds
over what types of encryption are used to secure Linux passwords.(Choose all that apply.
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?
How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by u
Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are
either not opened or ports that are not for public usage. How can she restrict this type of abuse by
limiting access to only specific IP addresses that are trusted by using one of the built-in Linux
Operating System tools?
What is the first step that the bank should take before enabling the audit feature?
A bank stores and processes sensitive privacy information related to home loans. However,
auditing has never been enabled on the system. What is the first step that the bank should take
before enabling the audit feature?