🔥 40% Off Crucial Exams Memberships — This Week Only

2 days, 10 hours remaining!

ISC2 Systems Security Certified Practitioner (SSCP) Practice Question

Your company deploys an identical, read-only JSON configuration file from a secure repository to dozens of Linux application servers. Policy states that operations staff must be able to detect any unauthorized alteration of the file after deployment and receive an alert, while keeping administrative burden low. Which approach best meets the stated integrity requirement?

  • Generate and securely store a SHA-256 hash of the approved file, then have each server periodically recompute and compare its local file's hash to the reference value.

  • Encrypt the configuration file with AES-256 in CBC mode before distributing it to each server.

  • Store the configuration file on a RAID-1 mirrored disk array to prevent data loss from drive failures.

  • Set operating-system permissions so only the application's service account can read the configuration file.

ISC2 Systems Security Certified Practitioner (SSCP)
Security Concepts and Practices
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot