Short Answer
Match each term with the correct statement below.
a.baseline
b.buffer overrun
c.file handles
d.firewall daemon (firewalld)
e.Intrusion Detection System (IDS)
f.lsof command
g.nmap command
h.SSH agent
i.tunneling
j.tripwire
-A command that can be used to scan ports on network computers.
Correct Answer:

Verified
Correct Answer:
Verified
Q13: What two commands below can display memory
Q14: What file contains the DSA public key
Q15: Select the option that, when used with
Q16: If the / filesystem becomes corrupted, the
Q17: Some peripheral devices can perform a great
Q19: Match each term with the correct statement
Q20: If some users, such as software developers,
Q21: Which command can be used to see
Q22: What methods can be used to physically
Q23: What option can be specified with the