ExamGecko
Question list
Search
Search

Question 52 - Cybersecurity Audit discussion

Report
Export

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

A.
Sandboxing
Answers
A.
Sandboxing
B.
Whitelisting
Answers
B.
Whitelisting
C.
URL filtering
Answers
C.
URL filtering
D.
File integrity
Answers
D.
File integrity
Suggested answer: D

Explanation:

The control mechanism that is used to detect the unauthorized modification of key configuration settings isfile integrity. File integrity is the property of ensuring that files are not altered or corrupted by unauthorized users or processes. File integrity can be monitored by using tools that compare the current state of files with a baseline or checksum and alert on any changes.

asked 18/09/2024
Balvant Variya
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first