CompTIA Security+ SY0-701 Practice Question
Alice, a security administrator, needs to verify that the servers in her organization are in a known and trusted state before they process sensitive data. The process involves generating a set of measurements that reflect the current state of the servers and comparing them against a set of known good values provided by the vendor. Which of the following best describes the process Alice should implement to meet this requirement?
Implementing a Trusted Platform Module (TPM) to perform remote attestation of the servers during boot-up
Setting BIOS passwords to prevent unauthorized changes to hardware settings
Configuring the servers to enable remote wiping in case they fail a security check
Hashing system files at startup and sending the hashes to a central server for comparison