Which of the following describes the process of comparing cryptographic hash functions of system executables, configuration files, and log files?

Which of the following describes the process of comparing cryptographic hash functions of system
executables, configuration files, and log files?

Which of the following describes the process of comparing cryptographic hash functions of system
executables, configuration files, and log files?

A.
Network based intrusion detection

B.
Stateful packet filtering

C.
File integrity auditing

D.
Host based intrusion detection



Leave a Reply 0

Your email address will not be published. Required fields are marked *