Exam 10: Auditing, Monitoring, and Logging

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is logged in the system log is predetermined by Windows.

(True/False)
4.7/5
(26)

Within the change management process, after the need for a change has been identified, a(n) ____ is submitted to the appropriate decision-making body.

(Multiple Choice)
4.8/5
(37)

What are six things that log management technologies are designed to do?

(Essay)
4.9/5
(33)

A spreadsheet program might record an error for access to a file in the ____ log.

(Multiple Choice)
4.7/5
(31)

From a network security perspective, the ____ logs are the most valuable to a systems and network administrator in identifying and resolving issues.

(Multiple Choice)
4.8/5
(34)

____ are processes that are designed to operate without user interaction.

(Multiple Choice)
4.7/5
(36)

In the Windows OS, services are usually initiated (loaded or started) at boot-up as ____, which consist of software code, data and/or other resources necessary to provide the service.

(Multiple Choice)
4.9/5
(41)

Explain the three categorical groupings for information processed by the federal government.

(Essay)
4.9/5
(26)

Describe the purpose of change management.

(Essay)
4.8/5
(28)

List the three actions that usually cause an audit system to log an event.

(Essay)
4.9/5
(43)

Logs provide dynamic records of running processes.

(True/False)
4.8/5
(37)

In Microsoft Windows-based systems, you can use the ____ to manage event logs from the command line.

(Multiple Choice)
4.8/5
(37)

The basic operation of a system logging facility is to collects events from log files, processes the data, stores the results, and performs notification or alerting, as required.

(True/False)
4.7/5
(44)

Match each item with a statement below. a.Configuration item f.Build list b.Version g.Configuration c.Major release h.Revision date d.Minor release i.Software library e.Build -A collection of components that make up a configuration item.

(Short Answer)
4.9/5
(33)

Match each item with a statement below. a.Configuration item f.Build list b.Version g.Configuration c.Major release h.Revision date d.Minor release i.Software library e.Build -A hardware or software item that is to be modified and revised throughout its life cycle.

(Short Answer)
4.8/5
(36)

Why is it important to keep track of system restart and shutdown events?

(Essay)
4.9/5
(36)

Which Linux file records all logins and logouts that occur on the system?

(Multiple Choice)
4.9/5
(38)

____ is an IT governance framework and supporting toolset that allows managers to bridge the gap between control requirements, technical issues, and business risks.

(Multiple Choice)
4.9/5
(30)

A(n) ____________________ is any action that may be of interest to you on a device.

(Short Answer)
4.8/5
(40)

Which Linux file shows a listing of failed login attempts?

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)