Exam 12: Security Through Monitoring and Auditing
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
List eight different types of information that might be found in a log created by an auditor.
Free
(Essay)
4.9/5
(35)
Correct Answer:
Any eight of the following:
1. Every time services are started and stopped
2. Every time services are reconfigured or configured incorrectly
3. Hardware events, such as when a peripheral has been activated or if disk space is running out
4. Hardware problems, such as a failing port, disk drive, or other problems
5. Every time files and directories are backed up
6. Events related to network services such as DNS, DHCP, Web servers, and others
7. Every time an operating system has been shut down and rebooted
8. Every logon attempt
9. Every time a file has been accessed
10. Every time permissions are changed on an object
11. Every time a print job has succeeded or failed
12. Network connection events
A(n) ____________________ is a command-line string issued remotely that is intended to weaken the security or to alter an operating system.
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
string signature
Which Network Monitor pane provides statistics about traffic from other computers on the network, including the MAC (device) address of each computer's NIC and data about the number of frames sent from and received by each computer?
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
C
In Red Hat Linux, log files are managed through a process called ____________________ .
(Short Answer)
4.9/5
(40)
What type of computer is placed on a network to attract attackers?
(Multiple Choice)
4.9/5
(30)
SYSCON is a Server Console command that is carried forward from earlier versions of NetWare.
(True/False)
5.0/5
(37)
What utility can be used to clean up the Mac OS X Server logs?
(Multiple Choice)
4.8/5
(44)
What type of intrusion detection monitors the system on which it is loaded?
(Multiple Choice)
4.8/5
(41)
The Netware 6.x Console Log enables you to trace information, such as NLMs that have been loaded or unloaded, and to trace other activities that have been performed from the console.
(True/False)
4.7/5
(19)
SNMP enables network agents to gather information about network performance and send that information to a network management station.
(True/False)
4.7/5
(41)
By default in Red Hat Linux 9.x , how many rotation levels does each log file have?
(Multiple Choice)
4.9/5
(43)
Match the following terms to the appropriate definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(27)
Which command provides information about who is logged on to Red Hat Linux 9.x?
(Multiple Choice)
4.9/5
(37)
Does the Netware 6.x Console log contain error information recorded for the NetWare server?
(True/False)
4.9/5
(27)
Which type of IDS automatically records information to a log?
(Multiple Choice)
4.9/5
(40)
In the Windows 2000 Computer Management tool, what three options under Shared Folders provide information about users currently logged on to the operating system?
(Essay)
4.8/5
(26)
The device log records information about system-related events such as hardware errors, driver problems, and hard drive errors.
(True/False)
4.9/5
(28)
Which Linux Red Hat 9.x "who" command option shows the amount of time each user process has been idle?
(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)