A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?
A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?
To ensure that sensitive data is not modified, the bank should use file integrity monitoring. This process involves validating the integrity of operating system and application software files by comparing the current file state with a known, good baseline. It helps detect any unauthorized modifications, ensuring data integrity.
C. File Integrity Monitoring File integrity monitoring is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
C. File integrity monitoring