Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 2 Question 48 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 48
Topic #: 2
[All GSLC Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Avery
6 months ago
Haha, C) Shoulder surfing? Really? That's just spying on someone, not checking file hashes. B) is the clear winner here.
upvoted 0 times
...
Dacia
6 months ago
B) for sure, that's the only one that involves checking the integrity of system files. The other options are way off.
upvoted 0 times
Joesph
5 months ago
B) Definitely, it's important to regularly check the integrity of system files to ensure they haven't been tampered with.
upvoted 0 times
...
Willow
5 months ago
C) Yeah, I agree. A) Reconnaissance and D) Spoofing don't really fit the description.
upvoted 0 times
...
Elsa
5 months ago
A) I think it's B) File integrity auditing too, it's the only one that makes sense in this context.
upvoted 0 times
...
Gracie
5 months ago
C) Definitely, it helps ensure that the system hasn't been tampered with.
upvoted 0 times
...
Marshall
5 months ago
A) No doubt, it's important to verify the integrity of system files.
upvoted 0 times
...
Anjelica
5 months ago
B) File integrity auditing
upvoted 0 times
...
...
Catarina
6 months ago
I agree with Marleen. It makes sense to compare hash functions for system executables and configuration files to ensure their integrity.
upvoted 0 times
...
Marleen
6 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...
Tish
6 months ago
Hmm, I'm not sure but I think B) File integrity auditing is the correct answer. Gotta keep those executables and configs secure!
upvoted 0 times
...
Isaiah
7 months ago
Definitely B) File integrity auditing. That's the only one that makes sense for comparing cryptographic hashes.
upvoted 0 times
Haydee
5 months ago
File integrity auditing is crucial for ensuring the security of system executables and configuration files.
upvoted 0 times
...
Isabelle
5 months ago
I agree, B) File integrity auditing is the correct answer for comparing cryptographic hashes.
upvoted 0 times
...
Sue
5 months ago
File integrity auditing is crucial for ensuring the security of system executables and configuration files.
upvoted 0 times
...
Miles
6 months ago
I agree, B) File integrity auditing is the correct answer for comparing cryptographic hashes.
upvoted 0 times
...
Carol
6 months ago
File integrity auditing is important for ensuring the security of system executables and configuration files.
upvoted 0 times
...
Toshia
6 months ago
I agree, B) File integrity auditing is the correct process for comparing cryptographic hash functions.
upvoted 0 times
...
...

Save Cancel