Exam 12: Security Through Monitoring and Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List eight different types of information that might be found in a log created by an auditor.

Free
(Essay)
4.9/5
(35)
Correct Answer:
Verified

Any eight of the following:
1. Every time services are started and stopped
2. Every time services are reconfigured or configured incorrectly
3. Hardware events, such as when a peripheral has been activated or if disk space is running out
4. Hardware problems, such as a failing port, disk drive, or other problems
5. Every time files and directories are backed up
6. Events related to network services such as DNS, DHCP, Web servers, and others
7. Every time an operating system has been shut down and rebooted
8. Every logon attempt
9. Every time a file has been accessed
10. Every time permissions are changed on an object
11. Every time a print job has succeeded or failed
12. Network connection events

A(n) ____________________ is a command-line string issued remotely that is intended to weaken the security or to alter an operating system.

Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Verified

string signature

Which Network Monitor pane provides statistics about traffic from other computers on the network, including the MAC (device) address of each computer's NIC and data about the number of frames sent from and received by each computer?

Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
Verified

C

  Which Netware 6.x log is displayed in the figure above? Which Netware 6.x log is displayed in the figure above?

(Multiple Choice)
4.7/5
(31)

In Red Hat Linux, log files are managed through a process called ____________________ .

(Short Answer)
4.9/5
(40)

What type of computer is placed on a network to attract attackers?

(Multiple Choice)
4.9/5
(30)

SYSCON is a Server Console command that is carried forward from earlier versions of NetWare.

(True/False)
5.0/5
(37)

What utility can be used to clean up the Mac OS X Server logs?

(Multiple Choice)
4.8/5
(44)

What type of intrusion detection monitors the system on which it is loaded?

(Multiple Choice)
4.8/5
(41)

The Netware 6.x Console Log enables you to trace information, such as NLMs that have been loaded or unloaded, and to trace other activities that have been performed from the console.

(True/False)
4.7/5
(19)

What four tasks can be accomplished using NetWare Remote Manager?

(Essay)
4.8/5
(29)

SNMP enables network agents to gather information about network performance and send that information to a network management station.

(True/False)
4.7/5
(41)

By default in Red Hat Linux 9.x , how many rotation levels does each log file have?

(Multiple Choice)
4.9/5
(43)
Match the following terms to the appropriate definition.
Records specific situations that an administrator wants to be warned about
Auditor
Sends an alert to an administrator or takes an action to block an attack
Passive intrusion detection
Setting up ways to detect and record intrusion attempts, without taking action
Filter
Correct Answer:
Verified
Premises:
Responses:
Records specific situations that an administrator wants to be warned about
Auditor
Sends an alert to an administrator or takes an action to block an attack
Passive intrusion detection
Setting up ways to detect and record intrusion attempts, without taking action
Filter
A viewing capability that enables you to display only specific events
Decoy
Used to attract attackers
Trigger
Examines captured data and determines if there has been an intrusion
Inspector
Performs a specific function when a predefined situation occurs
Active intrusion detection
Used to detect and report possible network and computer system intrusions
IDS
Tracks a wide range of data and events related to an operating system
Alert
A message sent to an administrator about a specific operating system event
Trap
(Matching)
4.7/5
(27)

Which command provides information about who is logged on to Red Hat Linux 9.x?

(Multiple Choice)
4.9/5
(37)

Does the Netware 6.x Console log contain error information recorded for the NetWare server?

(True/False)
4.9/5
(27)

Which type of IDS automatically records information to a log?

(Multiple Choice)
4.9/5
(40)

In the Windows 2000 Computer Management tool, what three options under Shared Folders provide information about users currently logged on to the operating system?

(Essay)
4.8/5
(26)

The device log records information about system-related events such as hardware errors, driver problems, and hard drive errors.

(True/False)
4.9/5
(28)

Which Linux Red Hat 9.x "who" command option shows the amount of time each user process has been idle?

(Multiple Choice)
4.9/5
(24)
Showing 1 - 20 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)