Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 3 Question 43 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 43
Topic #: 3
[All GSLC Questions]

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Natalie
6 months ago
I believe the correct answer is B) File integrity auditing, because it ensures the integrity of system files and detects unauthorized changes.
upvoted 0 times
...
Aleta
6 months ago
No, I don't think it's reconnaissance. File integrity auditing is specifically about comparing hash functions.
upvoted 0 times
...
Kristofer
6 months ago
I'm not sure, but I think it might be A) Reconnaissance.
upvoted 0 times
...
Mertie
6 months ago
I agree with Aleta, because file integrity auditing involves checking the integrity of system files.
upvoted 0 times
...
Aleta
7 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...
Eliz
7 months ago
No, I believe the correct answer is B) File integrity auditing. It's about ensuring system files haven't been tampered with.
upvoted 0 times
...
Belen
7 months ago
I'm not sure, but I think it's related to A) Reconnaissance.
upvoted 0 times
...
Fannie
7 months ago
I agree with because file integrity auditing involves comparing cryptographic hash functions.
upvoted 0 times
...
Tijuana
7 months ago
I think the answer is B) File integrity auditing.
upvoted 0 times
...
Blossom
8 months ago
Ooh, file integrity auditing, for sure. It's like the cybersecurity version of a game of hide-and-seek. Gotta stay one step ahead of those sneaky hackers, am I right?
upvoted 0 times
...
Carlee
8 months ago
File integrity auditing, no doubt. It's like the digital equivalent of checking your door locks every night. Gotta keep those system files safe and sound, you know?
upvoted 0 times
...
Noel
8 months ago
Ah, the age-old battle of keeping your system secure. File integrity auditing is the way to go, my friends. Gotta make sure those hashes are on point, or the bad guys might just waltz right in.
upvoted 0 times
...
Lyndia
8 months ago
Definitely file integrity auditing. I mean, who wants to wake up one day and find out their computer's been taken over by some rogue actor? Not me, that's for sure.
upvoted 0 times
...
Jovita
8 months ago
File integrity auditing, for sure. It's the only way to know if someone's been messing with your precious system files. Better keep those hash functions on point, or who knows what kind of trouble you might find yourself in.
upvoted 0 times
Wava
6 months ago
Absolutely, it's crucial for security.
upvoted 0 times
...
Timmy
7 months ago
B) File integrity auditing
upvoted 0 times
...
...
Lisha
8 months ago
Ah, the age-old question of 'how do I make sure my system hasn't been tampered with?' I'm pretty sure this is file integrity auditing. Gotta keep an eye on those pesky hackers, am I right?
upvoted 0 times
...

Save Cancel