Multiple Choice
It is possible to run critical services on a Linux machine in such as way that the root directory for that service seems to be different than the root of the actually system. The purpose is to prevent access to any files outside of that directory structure. What is this technique called?
A) Chroot jail
B) Tar pit
C) tcpwrappers
D) Pluggable Authentication Modules
Correct Answer:

Verified
Correct Answer:
Verified
Q4: An attacker sends email to a domain
Q5: A common technique when compromising Linux hosts
Q6: The act of stealing information from a
Q7: Which of the following is the static
Q8: In order to speed up the process
Q10: Bill seems to be connected to every
Q11: As a technique, rootkits hide processes and
Q12: Which of the following is not a
Q13: Marco wants to encode data into a
Q14: Ernest finds a laptop that seems to