Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 1 Question 61 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 61
Topic #: 1
[All GSLC Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tiera
3 months ago
I'd say B, but I'm also partial to C. Shoulder surfing can be quite the thrill, you know.
upvoted 0 times
Erick
2 months ago
I agree, both B and C have their merits. It's important to consider all aspects of security.
upvoted 0 times
...
Selene
2 months ago
I see your point, but I think C is also a valid choice. Shoulder surfing can be a risk in certain situations.
upvoted 0 times
...
Romana
2 months ago
I think B is the correct answer. File integrity auditing is important for security.
upvoted 0 times
...
...
Gertude
3 months ago
B) File integrity auditing - the only answer that makes sense here. Gotta keep those hashes in check!
upvoted 0 times
Malcolm
2 months ago
D) Spoofing - Incorrect, file integrity auditing is the process we're talking about.
upvoted 0 times
...
Lavonna
2 months ago
C) Shoulder surfing - Nope, it's all about checking those hashes.
upvoted 0 times
...
Vallie
2 months ago
A) Reconnaissance - That's not it, file integrity auditing is the way to go.
upvoted 0 times
...
Serina
2 months ago
B) File integrity auditing - the only answer that makes sense here. Gotta keep those hashes in check!
upvoted 0 times
...
...
Jeanice
3 months ago
I agree with Cary. It makes sense to compare cryptographic hash functions for file integrity.
upvoted 0 times
...
Marilynn
3 months ago
Hmm, I'm gonna go with B. Sounds like the most relevant option to me.
upvoted 0 times
...
Peggy
3 months ago
File integrity auditing, of course! Gotta make sure those executables and config files haven't been tampered with.
upvoted 0 times
Coleen
2 months ago
B) File integrity auditing
upvoted 0 times
...
Sheron
3 months ago
File integrity auditing, of course! Gotta make sure those executables and config files haven't been tampered with.
upvoted 0 times
...
...
Cary
3 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...

Save Cancel