Free CompTIA Security+ SY0-701 Practice Question

Alice, a security administrator, needs to verify that the servers in her organization are in a known and trusted state before they process sensitive data. The process involves generating a set of measurements that reflect the current state of the servers and comparing them against a set of known good values provided by the vendor. Which of the following best describes the process Alice should implement to meet this requirement?

  • Setting BIOS passwords to prevent unauthorized changes to hardware settings

  • Hashing system files at startup and sending the hashes to a central server for comparison

  • Configuring the servers to enable remote wiping in case they fail a security check

  • Implementing a Trusted Platform Module (TPM) to perform remote attestation of the servers during boot-up

This question's topic:
CompTIA Security+ SY0-701 / 
Security Operations
Your Score:

Check or uncheck an objective to set which questions you will receive.