___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.

A. Intrusion prevention systems
B. System integrity verification tools
C. Log analysis tools
D. Network and host intrusion detection systems

B. System integrity verification tools

Computer Science & Information Technology

You might also like to view...

What is the proper way to declare a vector of strings named names?

a. vector strings names; b. vector string; c. vector names; d. all of the above

Computer Science & Information Technology

What BSIMM practice improves the skills of the people most closely associated with the software lifecycle?

A. Strategy & Metrics B. Compliance & Policy C. Training D. Attack Models

Computer Science & Information Technology