PrepAway - Latest Free Exam Questions & Answers

Which of the following describes the process of comparing cryptographic hash functions of system executables,

Which of the following describes the process of comparing cryptographic hash functions of system
executables, configuration files, and log files?

PrepAway - Latest Free Exam Questions & Answers

A.
Network based intrusion detection

B.
Stateful packet filtering

C.
File integrity auditing

D.
Host based intrusion detection


Leave a Reply