The security administrator runs an rpm verify command which records the MD5 sum, permissions, and timestamp of each file on the system. The administrator saves this information to a separate server. Which of the following describes the procedure the administrator has performed?
A. Host software base-lining
B. File snapshot collection
C. TPM
D. ROMDB verification
Answer: D. ROMDB verification
Computer Science & Information Technology
You might also like to view...
How do DPCs increase the system’s responsiveness to incoming device interrupts?
What will be an ideal response?
Computer Science & Information Technology
A combo box is a combination of the text box and command button controls.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology