Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 12 discussion

Actual exam question from ISC's CISSP
Question #: 12
Topic #: 1
[All CISSP Questions]

Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?

  • A. File Integrity Checker
  • B. Security information and event management (SIEM) system
  • C. Audit Logs
  • D. Intrusion detection system (IDS)
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
franbarpro
Highly Voted 1 year, 7 months ago
File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted. FIM, which is a type of change auditing, verifies and validates these files by comparing the latest versions of them to a known, trusted “baseline.” If FIM detects that files have been altered, updated, or compromised, FIM can generate alerts to ensure further investigation, and if necessary, remediation, takes place.
upvoted 16 times
jackdryan
1 year ago
A is correct
upvoted 2 times
...
...
RawToast
Highly Voted 1 year, 6 months ago
Selected Answer: B
The part that is standing out to me is "particularly unauthorized changes." FIM would tell us if there was a change but a SIEM could contain information about WHO is implementing the changes to the content we are analyzing. Just being sure of a change is not enough to determine if the change was authorized of not. I would lean toward SIEM just because of the ending of the question.
upvoted 9 times
Kyanka
1 month, 3 weeks ago
This is a classic cert exam tactic of giving you an almost correct answer and the actual correct answer. Without the 2nd half of the sentence, you wouldn't know SIEM is the BEST answer.
upvoted 1 times
...
RonWonkers
1 year, 6 months ago
I think you are right
upvoted 3 times
...
jens23
10 months, 1 week ago
I've used the exact same reasoning.
upvoted 1 times
...
...
CCNPWILL
Most Recent 2 weeks, 6 days ago
Selected Answer: A
A is correct. Answer A best resembles what a checksum would do, which is what the question is asking for. A
upvoted 1 times
...
jackrj87
1 month ago
Selected Answer: A
A as per my knowledge
upvoted 1 times
...
sbear123
1 month, 1 week ago
A is correct answer
upvoted 1 times
...
homeysl
1 month, 2 weeks ago
Selected Answer: A
Content is a giveaway
upvoted 1 times
...
1000ba4
1 month, 3 weeks ago
Let's say we have a black box solution, such as a firewall, IDS, or IPS. These black boxes can't install a FIM agent or any endpoint solution because they are black boxes. So, the only way to detect unauthorized changes is to integrate these black boxes with a SIEM and monitor the alerts and events related to unauthorized change event IDs.
upvoted 1 times
1000ba4
1 month, 3 weeks ago
I apologize, actually, there is an agentless File Integrity Checker, so the answer is File Integrity Checker, which is (A).
upvoted 1 times
...
...
Soleandheel
4 months, 3 weeks ago
Common guys, why would you even consider answer B when you have A? The correct answer is A. File Integrity Checker. A SIEM is known for logging and aggregating events not for checking unauthorised changes or modifications on files. Stop overthinking these questions. It's not rocket science people.
upvoted 5 times
...
bromings
5 months ago
An information security professional would typically use: A. File Integrity Checker File Integrity Checkers are tools used to monitor and validate the integrity of files and systems by regularly scanning and comparing the current state of files against a known baseline or reference. They detect unauthorized changes, modifications, or alterations to files by comparing attributes such as file size, timestamps, permissions, and checksums. When unauthorized changes occur, the file integrity checker can generate alerts or notifications to indicate potential security breaches or anomalies. While the other options (SIEM system, Audit Logs, and IDS) are also valuable security tools, they might not specifically focus on recognizing unauthorized changes to content in the same direct and detailed manner as a File Integrity Checker does.
upvoted 4 times
...
Ritesh07iet
6 months, 3 weeks ago
Selected Answer: A
File Integrity monitoring
upvoted 1 times
...
InclusiveSTEAM
6 months, 3 weeks ago
The answer is A and not B Security information and event management (SIEM) system: SIEM systems are comprehensive tools used for collecting, analyzing, and correlating data from various sources to identify security events and incidents. While SIEM systems can be configured to detect changes in logs and events, their primary focus is on broader security monitoring and event management rather than specifically monitoring changes to content.
upvoted 3 times
...
xxxBadManxxx
8 months, 2 weeks ago
A: An information security professional would use a File Integrity Monitoring (FIM) system to recognize changes to content, particularly unauthorized changes. File Integrity Monitoring is a security technique that involves monitoring and detecting changes to files, directories, and file systems. It helps ensure the integrity of critical system files and sensitive data by identifying any unauthorized or unexpected modifications, deletions, or additions. FIM systems use baseline comparisons or cryptographic hashing techniques to determine if files have been tampered with.
upvoted 1 times
...
georgegeorge125487
8 months, 2 weeks ago
You need an audit log to determine what, who and when changes happened.
upvoted 2 times
...
MrBrightSide
8 months, 2 weeks ago
Selected Answer: A
Most likely the siem alone won't be able to see this if there no fim first
upvoted 2 times
...
vorozco
10 months, 1 week ago
Leaning towards A. An internet search of "SIEM to detect unauthorized changes to a file" even brings back a bunch of results for FIM, and the results go into integrating FIM with SIEM. So, FIM seems to be the component that would actually be checking for unauthorized changes (it can just be integrated into a SIEM). https://www.solarwinds.com/assets/solarwinds/swresources/whitepaper/sem-whitepaper-benefits-of-integrating-file-integrity-monitoring-with-siem.pdf
upvoted 1 times
...
CPT_Pepper
10 months, 4 weeks ago
ANSWER: A You can configure File Integrity Monitoring (FIM) on a SIEM. Therefore, the others are cancelled out.
upvoted 2 times
...
KelvinYau
11 months ago
Selected Answer: B
In this day SIEM maybe a best choose. SIEM systems can provide a comprehensive view of security events
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...