A software development company uses file transfer protocol (FTP) to transfer software code between different teams.
Which security control is essential for protecting the integrity of software code that is transferred using FTP?
A.
Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.
B.
Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.
C.
Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.
D.
Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.
The correct answer is A — Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.
According to WGU Cybersecurity Architecture and Engineering (KFO1 / D488), verifying the integrity of transferred files can be done by using cryptographic hash functions. Comparing pre- and post-transfer hashes ensures that the data was not tampered with during transmission.
Intrusion detection (B) focuses on unauthorized access. Access control (C) protects the server but does not ensure file integrity. Backups (D) provide data recovery but do not validate file integrity during transfers.
Reference Extract from Study Guide:
"Hashing verifies data integrity by allowing a comparison of original and received file values, ensuring no tampering occurred during transit."
— WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Data Integrity Assurance
=============================================
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit