1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
5

The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with

out actually logging in under the root account in a Linux or UNIX system. A. True B. False
Computers and Technology
1 answer:
bagirrra123 [75]3 years ago
5 0

Answer:

B. False

Explanation:

The term Super user do (sudo) refers to a command that allows an administrator to run processes as root without actually logging in under the root account in a Linux or UNIX system.

On the other hand, a Linux Intrusion Detection System can be defined as a patch to the operating system kernel of the Linux machine, as well as a set of administrative tools that is typically used to improve the security of the Linux kernel through the implementation of a mandatory access control known as MAC.

Hence, the Linux Intrusion Detection System can be used to deny any unauthorized use of the input or output device, memory, raw devices, file access and other network administrative functions.

You might be interested in
Game Informer (often abbreviated to GI) is an American-based monthly magazine featuring articles, news, strategy, and reviews of
Eddi Din [679]

Answer:

it is d i just took it

Explanation:

6 0
3 years ago
Read 2 more answers
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
Taking into account recent technological developments, what technical advances do you think are possible in the next twenty year
stiv31 [10]

Nuclear Fusion reactors may reach the prototype commercial stage , The causes and possible treatment of Alzheimers Disease  and Partial cloning of human organs for transplant therapy

Explanation:

Fusion may be an energy technology that seems to be perpetually coming over the horizon, but projects around the world such as SPARC are getting increasingly close to reactors that, although smaller in capacity, can produce net positive power in just a few years. To help accelerate discovery of permanent cure for Alzheimers, an alliance of pharmaceutical companies, nonprofit foundations and government advisers, has developed a partnership to share data from Alzheimer's clinical trials. This would definitely pave way for the permanent cure for Alzheimer. The most common method of therapeutic and reproductive cloning is somatic cell nuclear transfer (SCNT). SCNT involves separating the nucleus from a donor egg, and replacing it with the DNA from the organism meant to be cloned. Scientists could potentially clone organs with SCNT by cloning embryos, extracting the stem cells from the blastocyst, and stimulating the stem cells to differentiate into the desired organ. these three scientific and technological advancements are possible.

8 0
3 years ago
Editing tool for quickly making a repeated change throughout a document
riadik2000 [5.3K]
Find and Replace will work great
7 0
3 years ago
write algorithm and flowchart to calculate sum,difference, product and quotient of two integer number given by the user.​
Andreyy89

Answer:

Step1: Start

Step2: Initialize the count variable to zero

Step3: Initialize the sum variable to zero

Step4: Read a number say x

Step 5: Add 1 to the number in the count variable

Step6: Add the number x to the sum variable.

Step7: Is the count variable in the memory greater than 50?

           If yes, display the sum: go to step 8.

           If No, Repeat from step 4

Step8: Stop

Explanation:

5 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • Proxy data:
    12·1 answer
  • TRUE OR FALSE, databases allow you to search for content on the internet based on certain criteria (PLS ANSWER RIGHT)
    10·2 answers
  • How do you do basic addition and subtraction in binary, octal and hex?
    12·1 answer
  • Write a program that allows the user to navigate the lines of text in a file. The program should prompt the user for a filename
    7·1 answer
  • Durante 10s, la velocidad de rotación y el momento de giro de las ruedas de un coche eléctrico son 100 rpm y 1405,92 Nm, respect
    15·1 answer
  • Ok. So i am so confused. I have a message in my inbox but when I try to go to my inbox there is nothing there. Is that normal fo
    15·1 answer
  • Rectangle perimeter is 72 .Find the new perimeter if length is doubled and breadth is tripled​
    7·1 answer
  • 12. In Justify the text is aligned both to the right and to the left margins, adding extra space between words as necessary *
    13·2 answers
  • les agrees to install a new hard drive and software on marilee's computer in exchange for four of her used textbooks. after he i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!