Which of the following tools can be used to fulfill the requirements that were established by the engineer?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A security engineer needs to obtain a recurring log of changes to system files. The engineer is most concerned with detecting unauthorized changes to system data.

Which of the following tools can be used to fulfill the requirements that were established by the engineer?
A . TPM
B . Trusted operating system
C . File integrity monitor
D . UEFI
E . FDE

Answer: C

Leave a Reply

Your email address will not be published.