Exam 12: Security Through Monitoring and Auditing
Exam 1: Operating Systems Security: Keeping Computers and Networks Secure86 Questions
Exam 2: Viruses, Worms, and Malicious Software86 Questions
Exam 3: Security Through Authentication and Encryption86 Questions
Exam 4: Account-Based Security86 Questions
Exam 6: Firewalls and Border Security86 Questions
Exam 7: Physical and Network Topology Security86 Questions
Exam 8: Wireless Security86 Questions
Exam 9: Web, Remote Access, and VPN Security86 Questions
Exam 10: E-Mail Security86 Questions
Exam 11: Security Through Disaster Recovery86 Questions
Exam 12: Security Through Monitoring and Auditing86 Questions
Select questions type
File locks are open communication links between two processes on the server or between the server and a client.
(True/False)
4.8/5
(37)
In Network Monitor the capture store is the amount of RAM and virtual memory that is used to store captured data.
(True/False)
4.9/5
(28)
In Red Hat Linux, the Emacs and vi editors can be used to configure the syslog.conf file.
(True/False)
4.9/5
(39)
Network-based intrusion-detection software is used on a computer or network device and typically places the NIC on that device in ____________________ mode.
(Short Answer)
4.9/5
(34)
Which passive intrusion-detection tool audits activities on multiple operating systems, filters them, and collects the information into one large database for analysis of intrusions?
(Multiple Choice)
4.9/5
(34)
In Windows Server 2003, the ____________________ log records information about logon accesses and file, folder, and system policy changes.
(Short Answer)
4.8/5
(26)
In the event log, a notice that a service has started would be indicated with what type of symbol?
(Multiple Choice)
4.9/5
(33)
An inspector is an IDS that tracks a full range of data and events related to an operating system or network.
(True/False)
4.8/5
(47)
Understanding the normal conditions for operating systems and a network is accomplished by establishing baselines .
(True/False)
4.7/5
(49)
Which of the following activities are usually looked for using passive intrusion-detection tools?
(Multiple Choice)
4.8/5
(29)
In Mac OS X, the FTP Log keeps track of file uploads, downloads, and communications with FTP servers.
(True/False)
4.8/5
(36)
Which Network Monitor statistic shows total traffic in frames for broadcasts, unicasts, and multicasts?
(Multiple Choice)
4.8/5
(37)
Gathering performance statistics each time a new software application is installed, on slow, average, and peak periods during its use, and tracking how many users are on that software is an example of acquiring a _____.
(Multiple Choice)
4.8/5
(35)
At minimum, active intrusion detection alerts a server or network administrator about an attack or intrusion, so the administrator can take action.
(True/False)
5.0/5
(30)
In event log, a warning that a CD-ROM is not loaded would be indicated by what type of symbol?
(Multiple Choice)
4.9/5
(37)
Which of the following are examples of active intrusion-detection tools?
(Multiple Choice)
4.8/5
(38)
In Windows Server 2003 event viewer, an informational message such as a notice that a service has been started is prefaced by a black "!" (exclamation point) that appears on a yellow caution symbol.
(True/False)
4.8/5
(39)
Is the Process Viewer used by Linux Red Hat 9.x to display a listing of processes and the users who are running those processes?
(True/False)
4.9/5
(38)
Showing 41 - 60 of 86
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)