___________ scan critical system files, directories, and services to ensure they have not been changed without proper authorization.
A. Intrusion prevention systems
B. System integrity verification tools
C. Log analysis tools
D. Network and host intrusion detection systems
B. System integrity verification tools
Computer Science & Information Technology
You might also like to view...
What is the proper way to declare a vector of strings named names?
a. vector strings names;
b. vector
Computer Science & Information Technology
What BSIMM practice improves the skills of the people most closely associated with the software lifecycle?
A. Strategy & Metrics B. Compliance & Policy C. Training D. Attack Models
Computer Science & Information Technology