Which of the following describes the process of comparing cryptographic hash functions of system executables, configuration files, and log files?
A.
File integrity auditing
B.
Host based intrusion detection
C.
Network based intrusion detection
D.
Stateful packet filtering