Exam 12: Security Through Monitoring and Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What five things do inspectors typically look for?

(Essay)
4.8/5
(41)

In Windows 2000 Server, is it necessary to install Network Monitor and Network Monitor Driver separately?

(True/False)
4.9/5
(31)

In Windows Server 2003, the ____________________ log records information about how software applications are performing.

(Short Answer)
5.0/5
(40)

Which active intrusion-detection tool monitors HTML activity and blocks attacks?

(Multiple Choice)
4.7/5
(33)

Network Monitor supports event management , which enables a server administrator to set up filters to capture a certain event or type of network activity.

(True/False)
4.9/5
(36)

Host wrapper software, which may also be called a(n) ____________________, monitors network activity into or out of the computer, including protocols, packets, broadcasts, remote logon attempts, dial-in attempts, port scanning, and other activities.

(Short Answer)
4.9/5
(44)

In Mac OS X, which log contains information about printing activities?

(Multiple Choice)
4.8/5
(33)

Which type of IDS looks for excessive use of a computer's resources, such as the CPU or memory?

(Multiple Choice)
4.8/5
(42)

  Which file is being edited in the figure above? Which file is being edited in the figure above?

(Multiple Choice)
4.9/5
(35)

Which type of intrusion detection system looks for intrusion signatures on ports, through frame and packet headers, and through commands?

(Multiple Choice)
4.8/5
(34)

Typically, an IDS ____________________ is software that automatically records information to a log.

(Short Answer)
4.9/5
(48)

List eight server monitoring functions that can be viewed using the Netware MONITOR command.

(Essay)
4.9/5
(39)

Does the Netware Remote Manager allow you to send messages to a particular user or to all users?

(True/False)
4.8/5
(31)

In Netware 6.x, what directory contains the Audit log and the Console log?

(Multiple Choice)
4.9/5
(37)

If % Network utilization is frequently over 90 percent, that means the network is experiencing collisions and there may be bottlenecks due to the network design, possibly indicating the need to create more or different subnets.

(True/False)
4.9/5
(35)

In Red Hat Linux, the ____________________ Log provides information about jobs that are scheduled to run or that have already run, such as information about the number of minutes until a specific job will run.

(Short Answer)
4.8/5
(35)

What five activities are typically encompassed by host-based IDS?

(Essay)
4.9/5
(35)

In Window Server 2003, does the print$ share enable you to view the number of clients currently using the server as a print server?

(True/False)
4.7/5
(39)

Which active intrusion-detection tool monitors for intruders and can take action on the basis of preestablished security policies?

(Multiple Choice)
4.9/5
(43)

What are the three principle event logs in Windows 2000 Server and Windows Server 2003?

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)