Which of the following is NOT monitored by Integrity Monitoring?

Get ready for the Trend Micro Deep Security Certification with our comprehensive test. Study with detailed questions, hints, and explanations to ace your exam!

Integrity Monitoring primarily focuses on detecting unauthorized changes to specific components of the operating system and applications. It plays a crucial role in maintaining compliance and security by monitoring files, registry entries, and configurations.

Files are monitored to ensure that any alterations, such as additions or deletions, are tracked and alerts are generated for any unauthorized modifications. Registry entries are also monitored to detect any changes that could indicate a compromise or unauthorized access to configurations that control the system's behavior.

Listening ports are monitored as part of network security, as establishing an unexpected listening port could indicate malicious activity or breach attempts.

Memory usage, however, is generally associated with performance monitoring rather than integrity monitoring. Integrity Monitoring does not focus on the operational characteristics of the system such as current memory usage statistics or changes affecting the performance metrics. Hence, the monitoring of memory usage does not fall under the purview of Integrity Monitoring, making it the correct answer.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy