Exam CISSP All QuestionsBrowse all questions from this exam
Question 12

Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?

    Correct Answer: A

    An information security professional would use a File Integrity Checker to recognize changes to content, particularly unauthorized changes. File Integrity Checkers monitor and validate the integrity of files by regularly comparing the current state of files against a known baseline or reference. By detecting unauthorized changes, modifications, or alterations, File Integrity Checkers generate alerts and notifications for potential security breaches or anomalies, ensuring the content remains unchanged from its trusted state.

Discussion

17 comments
Sign in to comment
franbarproOption: A
Sep 7, 2022

File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted. FIM, which is a type of change auditing, verifies and validates these files by comparing the latest versions of them to a known, trusted “baseline.” If FIM detects that files have been altered, updated, or compromised, FIM can generate alerts to ensure further investigation, and if necessary, remediation, takes place.

jackdryan
Apr 23, 2023

A is correct

RawToastOption: B
Oct 10, 2022

The part that is standing out to me is "particularly unauthorized changes." FIM would tell us if there was a change but a SIEM could contain information about WHO is implementing the changes to the content we are analyzing. Just being sure of a change is not enough to determine if the change was authorized of not. I would lean toward SIEM just because of the ending of the question.

RonWonkers
Oct 25, 2022

I think you are right

jens23
Jun 22, 2023

I've used the exact same reasoning.

Kyanka
Mar 4, 2024

This is a classic cert exam tactic of giving you an almost correct answer and the actual correct answer. Without the 2nd half of the sentence, you wouldn't know SIEM is the BEST answer.

SoleandheelOption: A
Dec 4, 2023

Common guys, why would you even consider answer B when you have A? The correct answer is A. File Integrity Checker. A SIEM is known for logging and aggregating events not for checking unauthorised changes or modifications on files. Stop overthinking these questions. It's not rocket science people.

bromingsOption: A
Nov 26, 2023

An information security professional would typically use: A. File Integrity Checker File Integrity Checkers are tools used to monitor and validate the integrity of files and systems by regularly scanning and comparing the current state of files against a known baseline or reference. They detect unauthorized changes, modifications, or alterations to files by comparing attributes such as file size, timestamps, permissions, and checksums. When unauthorized changes occur, the file integrity checker can generate alerts or notifications to indicate potential security breaches or anomalies. While the other options (SIEM system, Audit Logs, and IDS) are also valuable security tools, they might not specifically focus on recognizing unauthorized changes to content in the same direct and detailed manner as a File Integrity Checker does.

InclusiveSTEAMOption: A
Oct 7, 2023

The answer is A and not B Security information and event management (SIEM) system: SIEM systems are comprehensive tools used for collecting, analyzing, and correlating data from various sources to identify security events and incidents. While SIEM systems can be configured to detect changes in logs and events, their primary focus is on broader security monitoring and event management rather than specifically monitoring changes to content.

georgegeorge125487Option: C
Aug 14, 2023

You need an audit log to determine what, who and when changes happened.

MrBrightSideOption: A
Aug 14, 2023

Most likely the siem alone won't be able to see this if there no fim first

RamyeOption: A
Jul 16, 2024

Integrity is to keep the file without changes. Certainly A is the answer.

tidissajiiuOption: A
Jun 14, 2024

File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted. FIM, ( https://seankilfoy.blogspot.com/2024/06/i-passed-cissp-exam.html ) which is a type of change auditing, verifies and validates these files by comparing the latest versions of them to a known, trusted “baseline.” If FIM detects that files have been altered, updated, or compromised, FIM can generate alerts to ensure further investigation, and if necessary, remediation, takes place

CCNPWILLOption: A
Jun 3, 2024

Answer is A. Obviously. changes in the file would ruin its original integrity directly. which is what the question is asking.

CCNPWILLOption: A
Apr 8, 2024

A is correct. Answer A best resembles what a checksum would do, which is what the question is asking for. A

jackrj87Option: A
Mar 26, 2024

A as per my knowledge

sbear123Option: A
Mar 15, 2024

A is correct answer

homeyslOption: A
Mar 14, 2024

Content is a giveaway

1000ba4Option: B
Mar 1, 2024

Let's say we have a black box solution, such as a firewall, IDS, or IPS. These black boxes can't install a FIM agent or any endpoint solution because they are black boxes. So, the only way to detect unauthorized changes is to integrate these black boxes with a SIEM and monitor the alerts and events related to unauthorized change event IDs.

1000ba4
Mar 4, 2024

I apologize, actually, there is an agentless File Integrity Checker, so the answer is File Integrity Checker, which is (A).

Ritesh07ietOption: A
Oct 10, 2023

File Integrity monitoring

xxxBadManxxxOption: A
Aug 14, 2023

A: An information security professional would use a File Integrity Monitoring (FIM) system to recognize changes to content, particularly unauthorized changes. File Integrity Monitoring is a security technique that involves monitoring and detecting changes to files, directories, and file systems. It helps ensure the integrity of critical system files and sensitive data by identifying any unauthorized or unexpected modifications, deletions, or additions. FIM systems use baseline comparisons or cryptographic hashing techniques to determine if files have been tampered with.