Short Answer
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A common IDS for Linux that monitors files and directories.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q30: What are the two golden rules that
Q31: What command can be used to change
Q32: If X Windows fails to start, what
Q33: Match each term with the correct statement
Q34: Which sar command option is used to
Q36: Match each term with the correct statement
Q37: How can netfilter/iptables be used to create
Q38: Asymmetric encryption uses a pair of keys
Q39: If network services that are started by
Q40: Match each term with the correct statement