CompTIA Server+ SK0-005 Practice Question
A systems administrator is responsible for a fleet of Linux-based web servers. A File Integrity Monitoring (FIM) system sends an alert indicating that a critical configuration file, /etc/httpd/conf/httpd.conf
, was recently modified on one of the servers. The administrator suspects unauthorized access and needs to validate the file's integrity against a known-good version. The administrator has access to a secure repository containing the original SHA-256 hashes for all baseline configuration files. Which of the following actions should the administrator perform FIRST to validate the file?
Immediately restore the
httpd.conf
file from the last known-good backup.Review the server's firewall logs for suspicious connection attempts made around the time of the modification.
Generate a new SHA-256 hash of the current
httpd.conf
file and compare it to the hash from the baseline repository.Use a network sniffer to capture and analyze traffic to and from the web server.