subject
Engineering, 16.04.2020 20:59 Usman458

8.6 an example of a host-based intrusion detection tool is the tripwire program. this is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. it uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. it must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow any log file to have new entries appended, but not for existing entries to be changed.

What are the advantages and disadvantages of using such a tool?

ansver
Answers: 2

Another question on Engineering

question
Engineering, 03.07.2019 23:20
Two technicians are discussing the intake air temperature (iat) sensor. technician a says that the computer uses the iat sensor as a backup to the engine coolant temperature (ect) sensor. technician b says that the powertrain control module (pcm) will subtract the calculated amount of fuel if the air measures hot. who is correct
Answers: 3
question
Engineering, 04.07.2019 18:10
Asingle-geared blanking press has a stroke of 200 mm and a rated capacity of 320 kn. a cam driven ram is assumed to be capable of delivering the full press load at constant force during the last 15 percent of a constant-velocity stroke. the camshaft has an average speed of 90 rev/min and is geared to the flywheel shaft at a 6: 1 ratio. the total work done is to include an allowance of 16 percent for friction a) estimate the maximum energy fluctuation b) find the rim weight for an effective diameter of 1.2 m and a coefficient of speed fluctuation of 0.10
Answers: 1
question
Engineering, 04.07.2019 18:10
During a steady flow process, the change of energy with respect to time is zero. a)- true b)- false
Answers: 2
question
Engineering, 04.07.2019 18:10
Different types of steels contain different elements that alter the characteristics of the steel. for each of the following elements, explain what the element does when alloyed with steel.
Answers: 2
You know the right answer?
8.6 an example of a host-based intrusion detection tool is the tripwire program. this is a file inte...
Questions
question
History, 22.09.2019 11:30
question
Spanish, 22.09.2019 11:30
question
Mathematics, 22.09.2019 11:30
question
Biology, 22.09.2019 11:30
Questions on the website: 13722360