The security administrator runs an rpm verify command which records the MD5 sum, permissions, and timestamp of each file on the system. The administrator saves this information to a separate server. Which of the following describes the procedure the administrator has performed?

A. Host software base-lining
B. File snapshot collection
C. TPM
D. ROMDB verification

Answer: D. ROMDB verification

Computer Science & Information Technology

You might also like to view...

How do DPCs increase the system’s responsiveness to incoming device interrupts?

What will be an ideal response?

Computer Science & Information Technology

A combo box is a combination of the text box and command button controls.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology