Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?
File integrity auditing
Reconnaissance
Spoofing
Shoulder surfing
Submit