Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam GSLC All Questions
Exam GSLC All Questions

View all questions & answers for the GSLC exam

GIAC Management GSLC Question # 133 Topic 14 Discussion

GSLC Exam Topic 14 Question 133 Discussion:
Question #: 133
Topic #: 14

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?


A.

Reconnaissance


B.

File integrity auditing


C.

Shoulder surfing


D.

Spoofing


Get Premium GSLC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.