which of the following controls could the security admi…

A security administrator wishes to ensure that one file in a confidential location is not altered. With very limited technology or restrictions to the file or folder, which of
the following controls could the security administrator use to determine if the file has been altered?

A security administrator wishes to ensure that one file in a confidential location is not altered. With very limited technology or restrictions to the file or folder, which of
the following controls could the security administrator use to determine if the file has been altered?

A.
Role-based access

B.
File-based encryption

C.
Rule-based access

D.
MD5 checksum



Leave a Reply 0

Your email address will not be published. Required fields are marked *

2 × 3 =