___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.

A. Intrusion prevention systems
B. System integrity verification tools
C. Log analysis tools
D. Network and host intrusion detection systems


B. System integrity verification tools

Computer Science & Information Technology

You might also like to view...

What are simple ways to minimize or prevent viruses?

What will be an ideal response?

Computer Science & Information Technology

The earliest and most common server-based programs are CGI scripts written in a language called Perl.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ image file format was created specifically for Web graphics, and it produces high-quality images with small file sizes.

A. JPEG B. GIF C. PNG D. XML

Computer Science & Information Technology

An organization is recovering data following a datacenter outage and determines that backup copies of files containing personal information were stored in an unsecure location, because the sensitivity was unknown. Which of the following activities should occur to prevent this in the future?

A. Business continuity planning B. Quantitative assessment C. Data classification D. Qualitative assessment

Computer Science & Information Technology