Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 8 Question 17 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 17
Topic #: 8
[All GCIH Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Jade
3 months ago
File integrity auditing, huh? I bet the hackers use 'File Integrity Undermining' to keep us on our toes. Gotta stay one step ahead of those digital troublemakers!
upvoted 0 times
Viola
2 months ago
C) Reconnaissance
upvoted 0 times
...
Justine
2 months ago
B) File integrity auditing
upvoted 0 times
...
Robt
2 months ago
A) Shoulder surfing
upvoted 0 times
...
...
Enola
4 months ago
Spoofing? What, like pretending to be someone else's computer? Nope, this is definitely about checking your own files, not impersonating others.
upvoted 0 times
Tanja
2 months ago
B) File integrity auditing
upvoted 0 times
...
Elly
2 months ago
Exactly, it's about verifying the integrity of your files to ensure they haven't been tampered with.
upvoted 0 times
...
Bobbye
2 months ago
D) Spoofing
upvoted 0 times
...
Amalia
3 months ago
C) Reconnaissance
upvoted 0 times
...
Lorenza
3 months ago
B) File integrity auditing
upvoted 0 times
...
Janessa
3 months ago
Yeah, it's definitely not about looking over someone's shoulder. It's about comparing cryptographic hash functions of system executables and configuration files.
upvoted 0 times
...
Aja
3 months ago
A) Shoulder surfing
upvoted 0 times
...
Stefania
3 months ago
A) Shoulder surfing
upvoted 0 times
...
Noemi
3 months ago
No, it's not about pretending to be someone else's computer. It's about checking the integrity of your own files.
upvoted 0 times
...
Vallie
3 months ago
B) File integrity auditing
upvoted 0 times
...
...
Stephen
4 months ago
Reconnaissance? Nah, that's more about gathering information about a target, not verifying file integrity. Gotta be option B.
upvoted 0 times
...
Marguerita
4 months ago
Shoulder surfing? Really? That's just watching someone type their password, not auditing file hashes. Come on, this one's too easy.
upvoted 0 times
...
Alesia
4 months ago
I think file integrity auditing is the process of comparing hash functions to ensure system executables and configuration files haven't been tampered with. Seems like the most relevant option here.
upvoted 0 times
...
Denae
4 months ago
I'm not sure, but I think it's important to verify the integrity of files to detect any unauthorized changes.
upvoted 0 times
...
Clorinda
4 months ago
I agree with Lorenza, because it makes sense to compare hash functions for system files.
upvoted 0 times
...
Lorenza
4 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...

Save Cancel