Exam 10: Auditing, Monitoring, and Logging
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Within the change management process, after the need for a change has been identified, a(n) ____ is submitted to the appropriate decision-making body.
(Multiple Choice)
4.8/5
(37)
What are six things that log management technologies are designed to do?
(Essay)
4.9/5
(33)
A spreadsheet program might record an error for access to a file in the ____ log.
(Multiple Choice)
4.7/5
(31)
From a network security perspective, the ____ logs are the most valuable to a systems and network administrator in identifying and resolving issues.
(Multiple Choice)
4.8/5
(34)
____ are processes that are designed to operate without user interaction.
(Multiple Choice)
4.7/5
(36)
In the Windows OS, services are usually initiated (loaded or started) at boot-up as ____, which consist of software code, data and/or other resources necessary to provide the service.
(Multiple Choice)
4.9/5
(41)
Explain the three categorical groupings for information processed by the federal government.
(Essay)
4.9/5
(26)
List the three actions that usually cause an audit system to log an event.
(Essay)
4.9/5
(43)
In Microsoft Windows-based systems, you can use the ____ to manage event logs from the command line.
(Multiple Choice)
4.8/5
(37)
The basic operation of a system logging facility is to collects events from log files, processes the data, stores the results, and performs notification or alerting, as required.
(True/False)
4.7/5
(44)
Match each item with a statement below.
a.Configuration item
f.Build list
b.Version
g.Configuration
c.Major release
h.Revision date
d.Minor release
i.Software library
e.Build
-A collection of components that make up a configuration item.
(Short Answer)
4.9/5
(33)
Match each item with a statement below.
a.Configuration item
f.Build list
b.Version
g.Configuration
c.Major release
h.Revision date
d.Minor release
i.Software library
e.Build
-A hardware or software item that is to be modified and revised throughout its life cycle.
(Short Answer)
4.8/5
(36)
Why is it important to keep track of system restart and shutdown events?
(Essay)
4.9/5
(36)
Which Linux file records all logins and logouts that occur on the system?
(Multiple Choice)
4.9/5
(38)
____ is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues, and business risks.
(Multiple Choice)
4.9/5
(30)
A(n) ____________________ is any action that may be of interest to you on a device.
(Short Answer)
4.8/5
(40)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)