A security administrator needs a method to secure data in an environment that includes some form of checks so track any changes. Which of the following should the administrator set up to achieve this goal?
A security administrator needs a method to secure data in an environment that includes some form of checks so track any changes. Which of the following should the administrator set up to achieve this goal?
File Integrity Monitoring (FIM) is a security technology that monitors and detects changes in files. It validates the integrity of files by comparing their current state with a known, good baseline, and it can identify unauthorized changes to various types of files. This makes FIM a suitable solution for a security administrator who needs to secure data and track any changes.
D. FIM (File Integrity Monitoring) File Integrity Monitoring (FIM) is a security technology that monitors and detects changes in files. FIM solutions can track modifications, access, or deletions of files and notify administrators of any changes, thus ensuring data integrity and security. Therefore, the correct answer is: D. FIM
FIM - stands for File Integrity Monitoring, which is a method to secure data by detecting any changes
File Integrity Monitoring (FIM) ■ Validates the integrity of operating system and application software files by comparing their current state with a known, good baseline ■ Identifies changes to ● Binary files ● System and Application Files ● Configuration and Parameter Files ■ Monitors critical system files for changes using agents and hash digests, triggering alerts when unauthorized changes occur