A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?
File Integrity Monitoring (FIM) is a security feature that tracks changes to files and directories on a system. It helps administrators detect unauthorized changes, modifications, or deletions to critical files and data. FIM solutions use checksums or hash values to verify the integrity of files, comparing them to baseline values or known good states. If any discrepancies are found, alerts are generated, and administrators can take appropriate action to investigate and respond to potential security incidents.
FIM is commonly used in environments where data security is essential, as it provides visibility into changes made to files, helping to detect potential security breaches or unauthorized access.
FIM (File Integrity Monitoring) - Technology that monitors and detects file changes that could be indicative of a cyberattack. FIM specifically involves examining files to see if and when they change, how they change, who changed them, and what can be done to restore those files if those modifications are unauthorized.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ApplebeesWaiter1122
Highly Voted 1 year, 9 months agoandresalcedo
Highly Voted 1 year, 9 months agoMr_TooTs
Most Recent 1 year, 9 months ago