Which definition of a fork in Linux is true?
Answer : D
Which identifier is used to describe the application or process that submitted a log message?
Answer : D
Reference:
https://www.tutorialspoint.com/unix/unix-system-logging.htm
Which protocol is expected to have a user agent, host, and referrer header in a packet capture?
Answer : B
Which evasion method involves performing actions slower than normal to prevent detection?
Answer : C
Reference:
https://books.google.by/books?id=KIwLSddtAWsC&pg=PA58&lpg=PA58&dq=timing+attack+performing+actions+slower+than+normal+to+prevent
+detection&source=bl&ots=9qu7ywV-mX&sig=_9lwcDDq-WNaYlEeP7VkR0MPAOE&hl=en&sa=X&redir_esc=y#v=onepage&q=timing%20attack%20performing%
20actions%20slower%20than%20normal%20to%20prevent%20detection&f=false