A security incident responder discovers an attacker has gained access to a network and has overwritten key system files with backdoor software. The server was reimaged and patched offline. Which of the following tools should be implemented to detect similar attacks?
A) Vulnerability scanner
B) TPM
C) Host-based firewall
D) File integrity monitor
E) NIPS
Correct Answer:
Verified
Q7: The Chief Information Security Officer (CISO) for
Q8: A user workstation was infected with a
Q9: An organization is in the process of
Q10: During a security assessment, an organization is
Q11: To prepare for an upcoming audit, the
Q13: An insurance company has two million customers
Q14: A server (10.0.0.2) on the corporate network
Q15: An organization has employed the services of
Q16: One of the objectives of a bank
Q17: A company monitors the performance of all
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents