Short Answer
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A software program that can be used to automatically authenticate users using their private key.
Correct Answer:

Verified
Correct Answer:
Verified
Q6: Select the iptables option that specifies the
Q7: Match each term with the correct statement
Q8: After downloading an installing any shared libraries,
Q9: What utility in the sysstat package measures
Q10: When performance issues arise, you can compare
Q12: What option for the iptables command can
Q13: What two commands below can display memory
Q14: What file contains the DSA public key
Q15: Select the option that, when used with
Q16: If the / filesystem becomes corrupted, the