CompTIA Security+ SY0-701 Practice Question
Alice, a security administrator, needs to verify that the servers in her organization are in a known and trusted state before they process sensitive data. The process involves generating a set of measurements that reflect the current state of the servers and comparing them against a set of known good values provided by the vendor. Which of the following best describes the process Alice should implement to meet this requirement?
Hashing system files at startup and sending the hashes to a central server for comparison
Setting BIOS passwords to prevent unauthorized changes to hardware settings
Implementing a Trusted Platform Module (TPM) to perform remote attestation of the servers during boot-up
Configuring the servers to enable remote wiping in case they fail a security check