Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 1 Question 61 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 61
Topic #: 1
[All GSLC Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tiera
1 months ago
I'd say B, but I'm also partial to C. Shoulder surfing can be quite the thrill, you know.
upvoted 0 times
Erick
11 days ago
I agree, both B and C have their merits. It's important to consider all aspects of security.
upvoted 0 times
...
Selene
17 days ago
I see your point, but I think C is also a valid choice. Shoulder surfing can be a risk in certain situations.
upvoted 0 times
...
Romana
18 days ago
I think B is the correct answer. File integrity auditing is important for security.
upvoted 0 times
...
...
Gertude
1 months ago
B) File integrity auditing - the only answer that makes sense here. Gotta keep those hashes in check!
upvoted 0 times
Malcolm
3 days ago
D) Spoofing - Incorrect, file integrity auditing is the process we're talking about.
upvoted 0 times
...
Lavonna
7 days ago
C) Shoulder surfing - Nope, it's all about checking those hashes.
upvoted 0 times
...
Vallie
21 days ago
A) Reconnaissance - That's not it, file integrity auditing is the way to go.
upvoted 0 times
...
Serina
24 days ago
B) File integrity auditing - the only answer that makes sense here. Gotta keep those hashes in check!
upvoted 0 times
...
...
Jeanice
2 months ago
I agree with Cary. It makes sense to compare cryptographic hash functions for file integrity.
upvoted 0 times
...
Marilynn
2 months ago
Hmm, I'm gonna go with B. Sounds like the most relevant option to me.
upvoted 0 times
...
Peggy
2 months ago
File integrity auditing, of course! Gotta make sure those executables and config files haven't been tampered with.
upvoted 0 times
Coleen
1 months ago
B) File integrity auditing
upvoted 0 times
...
Sheron
1 months ago
File integrity auditing, of course! Gotta make sure those executables and config files haven't been tampered with.
upvoted 0 times
...
...
Cary
2 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...

Save Cancel