Which of the following tools can be used to fulll the requirements that were established by the engineer?

A security engineer needs to obtain a recurring log of changes to system les. The engineer is most concerned with detecting unauthorized changes to system data.

Which of the following tools can be used to fulll the requirements that were established by the engineer?
A . TPM
B . Trusted operating system
C . File integrity monitor
D . UEFI
E . FDE

Answer: C

Latest SY0-501 Dumps Valid Version with 1130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments