A server administrator needs to validate the integrity of all system files. Which of the following methods should the administrator use?
A) Run a hash program to generate a checksum for all files on the system and compare it to an original report.
B) Run an encryption program to generate a checksum for all files on the system and compare it to an original report.
C) Run an antivirus program to generate a checksum for all files on the system and compare it to an original report.
D) Run a sniffer program to generate a checksum for all files on the system and compare it to an original report.
Correct Answer:
Verified
Q699: An L6-30 plug is considered:
A) a twist
Q700: A datacenter's redundant PDUs were recently upgraded.
Q701: A server that has been in production
Q702: Users at a company cannot log into
Q703: The systems administrator received an alert that
Q705: A vendor has released an update pack
Q706: When grid power goes out, all servers
Q707: A server administrator recently replaced an overheating
Q708: A server administrator is installing a 64-bit
Q709: A backup administrator has created a schedule
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents