Short Answer
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A program that can be used to detect unauthorized access to a Linux system.
Correct Answer:

Verified
Correct Answer:
Verified
Q35: Match each term with the correct statement
Q36: Match each term with the correct statement
Q37: How can netfilter/iptables be used to create
Q38: Asymmetric encryption uses a pair of keys
Q39: If network services that are started by
Q41: Processes can initiate numerous connections, called _,
Q42: How often are sar commands scheduled to
Q43: What command can be used to view
Q44: Assistive technologies are configured using what utility
Q45: Viewing the output of the _ command,