Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 3 Question 43 Discussion

Actual exam question for GIAC's GIAC Security Leadership exam
Question #: 43
Topic #: 3
[All GIAC Security Leadership Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Comments

Jovita
1 days ago
File integrity auditing, for sure. It's the only way to know if someone's been messing with your precious system files. Better keep those hash functions on point, or who knows what kind of trouble you might find yourself in.
upvoted 0 times
...
Lisha
3 days ago
Ah, the age-old question of 'how do I make sure my system hasn't been tampered with?' I'm pretty sure this is file integrity auditing. Gotta keep an eye on those pesky hackers, am I right?
upvoted 0 times
...

Save Cancel