When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?

a. file integrity monitoring (FIM)
b. file change management (FCM)
c. file access auditing (FAA)
d. file checksum watching (FCW)


ANSWER: a

Computer Science & Information Technology

You might also like to view...

When using the ________ Filter feature, filtering criteria must be set up in a specific format

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which one of the following filter options is not found on the number filter submenu?

A) Bottom 10... B) Below Average C) Between... D) Greater Than...

Computer Science & Information Technology

What is discovery-led practice?

What will be an ideal response?

Computer Science & Information Technology

____ is the process of transmitting all the files that constitute your website from your computer to the top directory, also called the root folder on the selected server or host computer.

A. Downloading B. Publishing C. Transferring D. Hosting

Computer Science & Information Technology