List of questions
Related questions
Question 1365 - CISSP discussion
Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?
A.
File Integrity Checker
B.
Security information and event management (SIEM) system
C.
Audit Logs
D.
Intrusion detection system (IDS)
Your answer:
0 comments
Sorted by
Leave a comment first