Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company’s website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered.
What tool could Simon and his administrators implement to accomplish this?
A . Snort is the best tool for their situation
B . They can implement Wireshark
C . They could use Tripwire
D . They need to use Nessus
Answer: C
Explanation:
Simon’s situation requires a tool that can monitor and alert administrators of critical file changes across the network. Tripwire is a File Integrity Monitoring (FIM) tool that serves this exact purpose. It can detect changes to system and configuration files, directories, and registry keys, and it is especially useful for spotting unauthorized changes that could indicate a security breach. Tripwire can help ensure that important files have not been tampered with, which seems to be the concern for Simon’s network following the incident.
Reference: The Certified Network Defender (CND) course material and study guide from EC-Council include discussions on the importance of monitoring critical systems and protecting network integrity. Tripwire is often highlighted in industry resources as a robust FIM tool that aligns with the objectives of maintaining network security and integrity as outlined in the CND curriculum1.
Latest 312-38 Dumps Valid Version with 120 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund