New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

GIAC Security Leadership Certification (GSLC) GSLC Question # 66 Topic 7 Discussion

GIAC Security Leadership Certification (GSLC) GSLC Question # 66 Topic 7 Discussion

GSLC Exam Topic 7 Question 66 Discussion:
Question #: 66
Topic #: 7

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?


A.

File integrity auditing


B.

Reconnaissance


C.

Spoofing


D.

Shoulder surfing


Get Premium GSLC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.