{"id":3244,"date":"2023-12-03T18:48:40","date_gmt":"2023-12-03T18:48:40","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question018\/"},"modified":"2023-12-03T18:48:40","modified_gmt":"2023-12-03T18:48:40","slug":"comptia-security-sy0-601-question018","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/SY0-601\/comptia-security-sy0-601-question018\/","title":{"rendered":"CompTIA Security+ SY0-601 &#8211; Question018"},"content":{"rendered":"<div class=\"question\">A company recently experienced an inside attack using a corporate machine that resulted in data compromise.<br \/>\nAnalysis indicated an unauthorized change to the software circumvented technological protection measures.<br \/>\nThe analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. Which of the following would provide the BEST solution?<br \/>\n<br \/><strong><br \/>A.<\/strong> HIPS<br \/><strong>B.<\/strong> FIM<br \/><strong>C.<\/strong> TPM<br \/><strong>D.<\/strong> DLP<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A company recently experienced an inside attack using a corporate machine that resulted in data compromise. Analysis indicated an unauthorized change to the software circumvented technological protection measures. The analyst was tasked with determining the best method to ensure the integrity of the systems remains intact and local and remote boot attestation can take place. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,21],"class_list":["post-3244","post","type-post","status-publish","format-standard","hentry","category-comptia-security-sy0-601","tag-comptia-security-sy0-601","tag-question-018"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/comments?post=3244"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/posts\/3244\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/media?parent=3244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/categories?post=3244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/SY0-601\/wp-json\/wp\/v2\/tags?post=3244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}