A technician is reviewing the logs and notices a large number of files were transferred to remote sites over the course of three months. This activity then stopped. The files were transferred via TLS-protected HTTP sessions from systems that do not send traffic to those sites.
The technician will define this threat as:
File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.
Diego
1 months agoDaniel
2 days agoRyan
5 days agoMarti
6 days agoAlfred
11 days agoCarlee
25 days agoGraham
2 months agoMilly
11 days agoKendra
22 days agoCassie
28 days agoNarcisa
2 months agoWhitney
9 days agoDorthy
10 days agoCora
12 days agoMel
22 days agoChi
2 months agoMary
1 months agoLavonne
1 months agoJospeh
2 months agoCarlee
18 days agoLavera
1 months agoJesusita
1 months agoLakeesha
2 months agoLettie
2 months agoKimbery
2 months agoLatrice
2 months ago