Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 12 discussion

Actual exam question from ISC's CISSP
Question #: 12
Topic #: 1
[All CISSP Questions]

Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?

  • A. File Integrity Checker
  • B. Security information and event management (SIEM) system
  • C. Audit Logs
  • D. Intrusion detection system (IDS)
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
franbarpro
Highly Voted 2 years, 2 months ago
File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted. FIM, which is a type of change auditing, verifies and validates these files by comparing the latest versions of them to a known, trusted “baseline.” If FIM detects that files have been altered, updated, or compromised, FIM can generate alerts to ensure further investigation, and if necessary, remediation, takes place.
upvoted 18 times
jackdryan
1 year, 7 months ago
A is correct
upvoted 2 times
...
...
RawToast
Highly Voted 2 months ago
Selected Answer: B
The part that is standing out to me is "particularly unauthorized changes." FIM would tell us if there was a change but a SIEM could contain information about WHO is implementing the changes to the content we are analyzing. Just being sure of a change is not enough to determine if the change was authorized of not. I would lean toward SIEM just because of the ending of the question.
upvoted 10 times
celomomo
1 month, 3 weeks ago
If you say SIEM, you can also say Audit log then since the audit log of that file tells you the changes made and that would be the table to query with SIEM. SIEM is not a standalone but relies on logs fed to it to correlate incidents and events. File Integrity checker seems more straightforward IMO.
upvoted 2 times
...
Kyanka
8 months, 3 weeks ago
This is a classic cert exam tactic of giving you an almost correct answer and the actual correct answer. Without the 2nd half of the sentence, you wouldn't know SIEM is the BEST answer.
upvoted 2 times
...
RonWonkers
2 years, 1 month ago
I think you are right
upvoted 4 times
...
jens23
1 year, 5 months ago
I've used the exact same reasoning.
upvoted 2 times
...
...
somsom
Most Recent 1 month, 1 week ago
answer is A because unauthorized access is there. siem creates alerts both authorized and non authorized. false positive and false negative
upvoted 1 times
...
Chibueze
1 month, 4 weeks ago
Selected Answer: A
This refers to "I" in the CIA triad and the keyword is integrity.
upvoted 1 times
...
iwannapass
2 months ago
Selected Answer: A
Leaning towards A. File Integrity checker. In the sybex 9th edition book page 1008 it says, " File integrity monitoring tools, also provide a secondary anti virus functionality. These tools are designed to alert ADMINISTRATORS to UNAUTHORIZED FILE MODIFICATIONS." I'm not sure if Admins are considered security professionals. But this seems to highlight the unauthorized portion of the question. I did read up on SIEM on page 841. And I had a hard time rationalizing the answer.
upvoted 3 times
...
Qwertyloopback
2 months ago
Selected Answer: A
FIM is correct from all of my research and experience. Take for example the FIM portion of McAfee ESS, you inpu the hash and are alerted if the file is modIfied. SEIM does not always have the potential for comparing hashes which is what would be necessary to detect file modification.
upvoted 3 times
...
david124
2 months ago
Selected Answer: A
A File Integrity Checker (FIC) is a security tool used to monitor and detect changes to files and directories on a computer system. FIC calculates cryptographic hashes (checksums) of files or directories and compares them to previously recorded checksums to detect changes. If the checksums differ, it indicates that the file or directory has been modified, deleted, or added, and alerts can be generated to inform the security team of potential unauthorized changes. Security Information and Event Management (SIEM) systems are used to collect, analyze, and correlate security event logs from multiple sources in real-time. Audit Logs also record system activity and can be used to monitor changes, but they are not as effective as FICs for detecting changes in files and directories.
upvoted 3 times
Dash0211
1 year, 7 months ago
As other's said, I think the key word is unauthorized changes. the FIC can show a change happened, doesn't mean it was unauthorized.
upvoted 2 times
...
...
vorozco
2 months ago
Leaning towards A. An internet search of "SIEM to detect unauthorized changes to a file" even brings back a bunch of results for FIM, and the results go into integrating FIM with SIEM. So, FIM seems to be the component that would actually be checking for unauthorized changes (it can just be integrated into a SIEM).
upvoted 1 times
...
Alcpt
2 months ago
Selected Answer: A
can only be A
upvoted 1 times
...
deeden
2 months ago
Selected Answer: A
While SIEM solutions can collect and analyze logs from various sources, including file system activity, they might not provide the same level of granular detail and focus as a dedicated file integrity monitoring (FIM) solution
upvoted 2 times
...
bromings
2 months ago
An information security professional would typically use: A. File Integrity Checker File Integrity Checkers are tools used to monitor and validate the integrity of files and systems by regularly scanning and comparing the current state of files against a known baseline or reference. They detect unauthorized changes, modifications, or alterations to files by comparing attributes such as file size, timestamps, permissions, and checksums. When unauthorized changes occur, the file integrity checker can generate alerts or notifications to indicate potential security breaches or anomalies. While the other options (SIEM system, Audit Logs, and IDS) are also valuable security tools, they might not specifically focus on recognizing unauthorized changes to content in the same direct and detailed manner as a File Integrity Checker does.
upvoted 4 times
...
xxxBadManxxx
2 months ago
A: An information security professional would use a File Integrity Monitoring (FIM) system to recognize changes to content, particularly unauthorized changes. File Integrity Monitoring is a security technique that involves monitoring and detecting changes to files, directories, and file systems. It helps ensure the integrity of critical system files and sensitive data by identifying any unauthorized or unexpected modifications, deletions, or additions. FIM systems use baseline comparisons or cryptographic hashing techniques to determine if files have been tampered with.
upvoted 1 times
...
1000ba4
2 months ago
Let's say we have a black box solution, such as a firewall, IDS, or IPS. These black boxes can't install a FIM agent or any endpoint solution because they are black boxes. So, the only way to detect unauthorized changes is to integrate these black boxes with a SIEM and monitor the alerts and events related to unauthorized change event IDs.
upvoted 1 times
1000ba4
8 months, 3 weeks ago
I apologize, actually, there is an agentless File Integrity Checker, so the answer is File Integrity Checker, which is (A).
upvoted 1 times
...
...
Soleandheel
2 months ago
Common guys, why would you even consider answer B when you have A? The correct answer is A. File Integrity Checker. A SIEM is known for logging and aggregating events not for checking unauthorised changes or modifications on files. Stop overthinking these questions. It's not rocket science people.
upvoted 5 times
...
Ramye
4 months, 1 week ago
Selected Answer: A
Integrity is to keep the file without changes. Certainly A is the answer.
upvoted 1 times
...
CCNPWILL
5 months, 3 weeks ago
Selected Answer: A
Answer is A. Obviously. changes in the file would ruin its original integrity directly. which is what the question is asking.
upvoted 1 times
...
CCNPWILL
7 months, 2 weeks ago
Selected Answer: A
A is correct. Answer A best resembles what a checksum would do, which is what the question is asking for. A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...