The answer is encryption
steganography would be hiding data, like in an image
digital forensics is the analysis done after an attack
and the last one is a security standard
Answer:
Testing that super user (SYSADMIN) access is limited to only appropriate personnel.
Explanation:
A test for logical access at an organization being audited would include testing that super user (SYSADMIN) access is limited to only appropriate personnel.
Answer:
C. Forms often provide special tools such as drop-down boxes for finding data.
Explanation:
Answer:
The ifconfig command.
Explanation:
A linux network system, like cisco networking devices, uses the linux operating system, in which it configuration differs from that of the cisco. It is very essential in network administration of have the basics in linux systems.
The network administrator uses the "ifconfig" command to display the IP addresses and subnet masks assigned to each network interface on a linux system.