What might be an example of file integrity monitoring?

Prepare for the SANS Global Industrial Cyber Security Professional Exam. Test your skills with multiple choice questions featuring hints and explanations. Ensure your success with our comprehensive materials.

File integrity monitoring refers to the process of ensuring that files, particularly critical system files and configuration files, have not been altered in an unauthorized manner. This is crucial for maintaining the security and stability of a system, especially in industrial environments.

Monitoring server operating system binaries for unapproved changes is a direct example of file integrity monitoring. By keeping track of the integrity of these binaries, an organization can detect any unauthorized modifications that may indicate a security breach or malicious activity. This monitoring is typically achieved using checksums, hashes, or other forms of validation to ensure that the files remain in their original state as intended. If a change is detected, it can trigger alerts or further investigations to understand the nature of the changes and ensure the system's integrity.

The other options do not specifically relate to the concept of file integrity monitoring. Creating a backup of user data is a protective measure but does not actively monitor changes to files. Updating software applications involves making changes to improve functionality or patch vulnerabilities but doesn’t monitor the integrity of the files. Scanning devices for malware is about detecting malicious software rather than specifically monitoring the integrity of files. Thus, the monitoring of server OS binaries for unapproved changes stands out as the best example of file integrity monitoring.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy