Which audit is conducted by, or on behalf of, the organization itself for internal purposes and can form the b
Which audit is conducted by, or on behalf of, the organization itself for internal purposes and can
form the basis for an organization’s self-declaration of conformity?
you need to issue in order to see the running processes, with the screen being updated every 10 seconds?
You have just installed a new SuSe Linux machine, and you are working on managing the
processes running on the system. What command will you need to issue in order to see the
running processes, with the screen being updated every 10 seconds?
Which keyword is used to tell Snort how far inside the packet it should look for the pattern, or defined conte
For the new Snort rules you are building, it will be required to have Snort examine inside the
content of the packet. Which keyword is used to tell Snort how far inside the packet it should look
for the pattern, or defined content match?
what does the plan need to say regarding tools according to ISO/IEC 20000-2:2005?
In planning to implement Service Management, what does the plan need to say regarding tools
according to ISO/IEC 20000-2:2005?
What is the effect of following these commands and actions?
After installing a new SuSe Linux system, you wish to enhance the security of this computer. You
type in the following commands (with actions in parenthesis): grub (press Enter) md5crypt qwerty
(copy the result of this command) quit
gedit /boot/grub/menu.1st & password -md5 (Paste what you copied earlier)
(Save and close gedit)
What is the effect of following these commands and actions?
you need to add to Snort?
You have been working with Snort, on your Windows Server 2003, for some time as a packet
capture tool, and now wish to connect Snort to a database on your server. You install MySQL as
the database, and are ready to configure Snort. If the database is named: snortdb1, has a user
name of: snort, and a password of: snortpass, what is the configuration line you need to add to
Snort?
What is the proper command to restart a process?
During a test of your SuSe Linux machine, you have noticed a specific process that is no longer
working as desired. What is the proper command to restart a process?
what is this known as?
As Intrusion Detection Systems become more sophisticated, the software manufacturers develop
different methods of detection. If an IDS uses the process of finding a deviation from a well know
pattern of user behavior, what is this known as?
Why is a scope statement for ISO/IEC 20000 important?
Why is a scope statement for ISO/IEC 20000 important?
what is the result of typing this command?
You are showing a colleague some of the commands available in Linux, and you type telinit 6 what
is the result of typing this command?