Valid Cybersecurity-Architecture-and-Engineering Dumps shared by ExamDiscuss.com for Helping Passing Cybersecurity-Architecture-and-Engineering Exam! ExamDiscuss.com now offer the newest Cybersecurity-Architecture-and-Engineering exam dumps, the ExamDiscuss.com Cybersecurity-Architecture-and-Engineering exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com Cybersecurity-Architecture-and-Engineering dumps with Test Engine here:
A software development company uses file transfer protocol (FTP) to transfer software code between different teams. Which security control is essential for protecting the integrity of software code that is transferred using FTP?
Correct Answer: A
The correct answer is A - Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code. According to WGU Cybersecurity Architecture and Engineering (KFO1 / D488), verifying the integrity of transferred files can be done by using cryptographic hash functions. Comparing pre- and post-transfer hashes ensures that the data was not tampered with during transmission. Intrusion detection (B) focuses on unauthorized access. Access control (C) protects the server but does not ensure file integrity. Backups (D) provide data recovery but do not validate file integrity during transfers. Reference Extract from Study Guide: "Hashing verifies data integrity by allowing a comparison of original and received file values, ensuring no tampering occurred during transit." - WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Data Integrity Assurance