medium
Single Answer
0

Mark wants to have a way to determine if attackers have modified files on a critical web application server. What type of tool should he deploy if he wants to be able to check for changes of this nature?

Answer Options

A

Drive encryption

B

File availability monitoring

C

File encryption

D

File integrity monitoring

Correct Answer: D

Explanation

File integrity monitoring tools use hashes to validate that files match their original content. If the files change, the hashes will not match, allowing the tool to alert administrators that a change has occurred. Drive encryption and file encryption both protect the confidentiality of data but don’t indicate changes without a signature. File availability monitoring is not a typical tool, although system or service availability monitoring is.