Question 36
Which of the following is a best practice for implementing HID?
Question 37
Which of the following DNS records are used in DNSSEC?
Question 38
Which of the following are differences between AppArmor and SELinux?
(Choose TWO correct answers)
(Choose TWO correct answers)
Question 39
Which of the following statements are valid wireshark capture filters?
(Choose TWO correct answers.)
(Choose TWO correct answers.)
Question 40
What is the purpose of AIDE?