ISC Exam Questions

What tool is being used to determine whether attackers have altered system files of executables?

What tool is being used to determine whether attackers have altered system files of executables?

A.
File Integrity Checker

B.
Vulnerability Analysis Systems

C.
Honey Pots

D.
Padded Cells

Explanation:

Although File Integrity Checkers are most often used to determine whether attackers have altered
system files or executables, they can also help determine whether vendor-supplied bug patches or
other desired changes have been applied to system binaries. They are extremely valuable to those
conducting a forensic examination of systems that have been attacked, as they allow quick and
reliable diagnosis of the footprint of an attack. This enables system managers to optimize the
restoration of service after incidents occur.