Multiple Choice
A company's Chief Information Security Officer (CISO) is concerned about the integrity of some highly confidential files. Any changes to these files must be tied back to a specific authorized user's activity session. Which of the following is the BEST technique to address the CISO's concerns?
A) Configure DLP to reject all changes to the files without pre-authorization. Monitor the files for unauthorized changes.
B) Regularly use SHA-256 to hash the directory containing the sensitive information. Monitor the files for unauthorized changes.
C) Place a legal hold on the files. Require authorized users to abide by a strict time context access policy. Monitor the files for unauthorized changes.
D) Use Wireshark to scan all traffic to and from the directory. Monitor the files for unauthorized changes.
Correct Answer:

Verified
Correct Answer:
Verified
Q80: A developer wrote a script to make
Q81: Clients are unable to access a company's
Q82: A security analyst is attempting to utilize
Q83: An organization was alerted to a possible
Q84: A security analyst received a SIEM alert
Q86: A cybersecurity analyst is responding to an
Q87: An analyst wants to identify hosts that
Q88: A critical server was compromised by malware,
Q89: A security analyst has observed several incidents
Q90: A security analyst is providing a risk