Multiple Choice
Carter is evaluating ways to detect intrusions on his Linux system. He has log file analysis under control as he needs to be able to easily create status reports for his boss. He is looking for tools that monitor modifications to files.
Which of the following is an option?
A) Firewalk
B) Whisker
C) He should write his own scripts using the find command
D) AIDE
Correct Answer:

Verified
Correct Answer:
Verified
Q18: What is a hash?<br>A) Single key algorithm
Q19: A mechanism that RFID devices use to
Q20: An attacker writes a script similar to
Q21: KC comes into work about 30 minutes
Q22: There are many products that take a
Q24: Darren wants to run a stealth nmap
Q25: If the hash of a password is
Q26: The ITU Protocol for sending audio-visual data
Q27: Tabatha wants to implement two-factor authentication that
Q28: Lucas is an Email administrator. He is