Exam 12: Security Through Monitoring and Auditing
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
In Windows 2000 Server, is it necessary to install Network Monitor and Network Monitor Driver separately?
(True/False)
4.9/5
(31)
In Windows Server 2003, the ____________________ log records information about how software applications are performing.
(Short Answer)
5.0/5
(40)
Which active intrusion-detection tool monitors HTML activity and blocks attacks?
(Multiple Choice)
4.7/5
(33)
Network Monitor supports event management , which enables a server administrator to set up filters to capture a certain event or type of network activity.
(True/False)
4.9/5
(36)
Host wrapper software, which may also be called a(n) ____________________, monitors network activity into or out of the computer, including protocols, packets, broadcasts, remote logon attempts, dial-in attempts, port scanning, and other activities.
(Short Answer)
4.9/5
(44)
In Mac OS X, which log contains information about printing activities?
(Multiple Choice)
4.8/5
(33)
Which type of IDS looks for excessive use of a computer's resources, such as the CPU or memory?
(Multiple Choice)
4.8/5
(42)
Which type of intrusion detection system looks for intrusion signatures on ports, through frame and packet headers, and through commands?
(Multiple Choice)
4.8/5
(34)
Typically, an IDS ____________________ is software that automatically records information to a log.
(Short Answer)
4.9/5
(48)
List eight server monitoring functions that can be viewed using the Netware MONITOR command.
(Essay)
4.9/5
(39)
Does the Netware Remote Manager allow you to send messages to a particular user or to all users?
(True/False)
4.8/5
(31)
In Netware 6.x, what directory contains the Audit log and the Console log?
(Multiple Choice)
4.9/5
(37)
If % Network utilization is frequently over 90 percent, that means the network is experiencing collisions and there may be bottlenecks due to the network design, possibly indicating the need to create more or different subnets.
(True/False)
4.9/5
(35)
In Red Hat Linux, the ____________________ Log provides information about jobs that are scheduled to run or that have already run, such as information about the number of minutes until a specific job will run.
(Short Answer)
4.8/5
(35)
In Window Server 2003, does the print$ share enable you to view the number of clients currently using the server as a print server?
(True/False)
4.7/5
(39)
Which active intrusion-detection tool monitors for intruders and can take action on the basis of preestablished security policies?
(Multiple Choice)
4.9/5
(43)
What are the three principle event logs in Windows 2000 Server and Windows Server 2003?
(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)