nerdexam
(ISC)2(ISC)2

CISSP · Question #1191

CISSP Question #1191: Real Exam Question with Answer & Explanation

Sign in or unlock CISSP to reveal the answer and full explanation for question #1191. The question stem and answer options stay visible for context.

Submitted by khalil_dz· Mar 5, 2026Security Operations

Question

Which of the following would an information security professional use to recognize changes to content, particularly unauthorized changes?

Options

  • AFile Integrity Checker
  • BSecurity information and event management (SIEM) system
  • CAudit Logs
  • DIntrusion detection system (IDS)

Unlock CISSP to see the answer

You've previewed enough free CISSP questions. Unlock CISSP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#file integrity monitoring#unauthorized changes#security tools
Full CISSP PracticeBrowse All CISSP Questions