?Match each term with the correct statement below.


A. ?A measure of normal system activity.
B. ?An attack in which a network service is altered in memory
C. ?The connections that a program makes to files on a filesystem.
D. A daemon used on some Linux systems to provide for easier configuration of netfilter via the ipchains command.?
E. ?A program that can be used to detect unauthorized access to a Linux system.
F. ?A command that lists the files that are currently being viewed or modified by software programs and users.
G. ?A command that can be used to scan ports on network computers.
H. ?A software program that can be used to automatically authenticate users using their private key.
I. ?The process of embedding network packets within other network packets.
J. A common IDS for Linux that monitors files and directories.?

A. ?baseline
B. buffer overrun?
C. ?file handles
D. ?firewall daemon (firewalld)
E. ?Intrusion Detection System (IDS)
F. ?lsof command
G. ?nmap command
H. ?SSH agent
I. ?tunneling
J. tripwire

Computer Science & Information Technology

You might also like to view...

A true command line interface (Terminal mode using tty1 through tty6) never goes into screen-saver mode.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Two of the most popular versions of UNIX to come out of the education market were created at the University of California at Berkeley: ____.

A. Berkeley Standard Distribution (BSD) version and System V B. Linux and System V C. Berkeley Standard Distribution (BSD) version and Linux D. System V and GNU

Computer Science & Information Technology