New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 8 Question 17 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 17
Topic #: 8
[All GCIH Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Tora
3 months ago
Nope, I think it could be A, shoulder surfing is sneaky too!
upvoted 0 times
...
Regenia
3 months ago
I thought it was more complicated than that, but yeah, B fits.
upvoted 0 times
...
Deeann
3 months ago
Wait, is it really just about comparing hashes? Sounds too simple.
upvoted 0 times
...
Letha
4 months ago
Agreed, B makes the most sense here!
upvoted 0 times
...
Rory
4 months ago
Definitely B, file integrity auditing is the right term.
upvoted 0 times
...
Antonio
4 months ago
I don't recall much about reconnaissance in this context, but it seems like it wouldn't fit. B feels like the best choice here.
upvoted 0 times
...
Jesse
4 months ago
I'm a bit confused. I thought shoulder surfing was related to observing someone enter their password, not file comparisons.
upvoted 0 times
...
Pok
4 months ago
I remember practicing a question similar to this, and I think it was definitely about checking the integrity of files. So, B sounds right to me.
upvoted 0 times
...
Ligia
5 months ago
I think the answer might be B, file integrity auditing. We talked about it in class, but I'm not completely sure.
upvoted 0 times
...
Filiberto
5 months ago
This is a good question to test our understanding of security concepts. I'm pretty sure the answer is B - file integrity auditing, since that's the process of verifying the hashes of system files to detect any changes or tampering.
upvoted 0 times
...
Leoma
5 months ago
I'm a little confused by the wording of this question. The options don't seem to directly match the description. I'll have to think about this one a bit more before answering.
upvoted 0 times
...
Lelia
5 months ago
Okay, let me think this through. We're looking for the process of comparing cryptographic hashes of system files, right? That sounds like it would be file integrity auditing to me. I'll go with B.
upvoted 0 times
...
Magnolia
5 months ago
Hmm, I'm not totally sure about this one. I know it has something to do with checking the integrity of system files, but I'm not 100% sure which option is the best description of that process.
upvoted 0 times
...
King
5 months ago
This question seems pretty straightforward. I'm pretty confident the answer is B - File integrity auditing.
upvoted 0 times
...
Luisa
5 months ago
This one seems pretty straightforward. I think the answer is Configuration Management, since that's the process that would ensure up-to-date information on known errors and corrected problems is available.
upvoted 0 times
...
Johnna
5 months ago
I'm pretty confident about this one. Scrum teams are supposed to have frequent releases, so I'll go with True.
upvoted 0 times
...
Jade
10 months ago
File integrity auditing, huh? I bet the hackers use 'File Integrity Undermining' to keep us on our toes. Gotta stay one step ahead of those digital troublemakers!
upvoted 0 times
Viola
9 months ago
C) Reconnaissance
upvoted 0 times
...
Justine
9 months ago
B) File integrity auditing
upvoted 0 times
...
Robt
9 months ago
A) Shoulder surfing
upvoted 0 times
...
...
Enola
10 months ago
Spoofing? What, like pretending to be someone else's computer? Nope, this is definitely about checking your own files, not impersonating others.
upvoted 0 times
Tanja
9 months ago
B) File integrity auditing
upvoted 0 times
...
Elly
9 months ago
Exactly, it's about verifying the integrity of your files to ensure they haven't been tampered with.
upvoted 0 times
...
Bobbye
9 months ago
D) Spoofing
upvoted 0 times
...
Amalia
9 months ago
C) Reconnaissance
upvoted 0 times
...
Lorenza
9 months ago
B) File integrity auditing
upvoted 0 times
...
Janessa
9 months ago
Yeah, it's definitely not about looking over someone's shoulder. It's about comparing cryptographic hash functions of system executables and configuration files.
upvoted 0 times
...
Aja
9 months ago
A) Shoulder surfing
upvoted 0 times
...
Stefania
10 months ago
A) Shoulder surfing
upvoted 0 times
...
Noemi
10 months ago
No, it's not about pretending to be someone else's computer. It's about checking the integrity of your own files.
upvoted 0 times
...
Vallie
10 months ago
B) File integrity auditing
upvoted 0 times
...
...
Stephen
10 months ago
Reconnaissance? Nah, that's more about gathering information about a target, not verifying file integrity. Gotta be option B.
upvoted 0 times
...
Marguerita
10 months ago
Shoulder surfing? Really? That's just watching someone type their password, not auditing file hashes. Come on, this one's too easy.
upvoted 0 times
...
Alesia
10 months ago
I think file integrity auditing is the process of comparing hash functions to ensure system executables and configuration files haven't been tampered with. Seems like the most relevant option here.
upvoted 0 times
...
Denae
10 months ago
I'm not sure, but I think it's important to verify the integrity of files to detect any unauthorized changes.
upvoted 0 times
...
Clorinda
11 months ago
I agree with Lorenza, because it makes sense to compare hash functions for system files.
upvoted 0 times
...
Lorenza
11 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...

Save Cancel