A system administrator discovers that the homepage of a public-facing Linux web server has been defaced. The administrator immediately takes the server offline. To determine the extent of the unauthorized changes and confirm which files were altered, which of the following actions should the administrator perform FIRST?
Perform a full anti-malware scan of the server's file systems.
Analyze web server access logs to identify the source IP address of the attack.
Use a file integrity monitoring tool to compare file checksums against a previously established baseline.
Run a port scanner to identify all open ports on the server.
The correct action is to use a file integrity monitoring (FIM) tool. In the event of a security breach like a website defacement, the immediate priority is to understand the scope of the compromise. An FIM tool compares the current checksums of critical files against a known-good baseline created when the server was in a secure state. This process quickly and accurately identifies all modified, added, or deleted files, which is essential for both remediation and forensic analysis. Running a port scanner is useful for identifying the attack vector but does not identify which specific files were compromised. Analyzing logs helps trace the attacker's origin but may not reveal all file system changes. An anti-malware scan is important but may not detect a simple file modification if no traditional malware was used to make the change.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a file integrity monitoring (FIM) tool?
Open an interactive chat with Bash
What is a checksum, and how does it work in security?
Open an interactive chat with Bash
Why is analyzing file changes more critical than running a port scanner after a breach?
Open an interactive chat with Bash
What is a file integrity monitoring (FIM) tool?
Open an interactive chat with Bash
How are file checksums used in FIM tools?
Open an interactive chat with Bash
Why is using an FIM tool prioritized over scanning logs or running a port scanner?
Open an interactive chat with Bash
What is a file integrity monitoring (FIM) tool?
Open an interactive chat with Bash
How does using checksums help identify unauthorized file changes?
Open an interactive chat with Bash
Why is it important to establish a 'known-good' baseline for a system?