GIAC Security Leadership Certification (GSLC) GSLC Question # 66 Topic 7 Discussion

GIAC Security Leadership Certification (GSLC) GSLC Question # 66 Topic 7 Discussion

GSLC Exam Topic 7 Question 66 Discussion:
Question #: 66
Topic #: 7

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?


A.

File integrity auditing


B.

Reconnaissance


C.

Spoofing


D.

Shoulder surfing


Get Premium GSLC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.