Exam 12: Security Through Monitoring and Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

File locks are open communication links between two processes on the server or between the server and a client.

(True/False)
4.8/5
(37)

In Network Monitor the capture store is the amount of RAM and virtual memory that is used to store captured data.

(True/False)
4.9/5
(28)

In Red Hat Linux, the Emacs and vi editors can be used to configure the syslog.conf file.

(True/False)
4.9/5
(39)

Network-based intrusion-detection software is used on a computer or network device and typically places the NIC on that device in ____________________ mode.

(Short Answer)
4.9/5
(34)

Which passive intrusion-detection tool audits activities on multiple operating systems, filters them, and collects the information into one large database for analysis of intrusions?

(Multiple Choice)
4.9/5
(34)

In Windows Server 2003, the ____________________ log records information about logon accesses and file, folder, and system policy changes.

(Short Answer)
4.8/5
(26)

In the event log, a notice that a service has started would be indicated with what type of symbol?

(Multiple Choice)
4.9/5
(33)

An inspector is an IDS that tracks a full range of data and events related to an operating system or network.

(True/False)
4.8/5
(47)

Understanding the normal conditions for operating systems and a network is accomplished by establishing baselines .

(True/False)
4.7/5
(49)

Which of the following activities are usually looked for using passive intrusion-detection tools?

(Multiple Choice)
4.8/5
(29)

What two useful tools does NetWare offers to view user connections?

(Essay)
4.9/5
(39)

In Mac OS X, the FTP Log keeps track of file uploads, downloads, and communications with FTP servers.

(True/False)
4.8/5
(36)

Which Network Monitor statistic shows total traffic in frames for broadcasts, unicasts, and multicasts?

(Multiple Choice)
4.8/5
(37)

Gathering performance statistics each time a new software application is installed, on slow, average, and peak periods during its use, and tracking how many users are on that software is an example of acquiring a _____.

(Multiple Choice)
4.8/5
(35)

At minimum, active intrusion detection alerts a server or network administrator about an attack or intrusion, so the administrator can take action.

(True/False)
5.0/5
(30)

In event log, a warning that a CD-ROM is not loaded would be indicated by what type of symbol?

(Multiple Choice)
4.9/5
(37)

Which of the following are examples of active intrusion-detection tools?

(Multiple Choice)
4.8/5
(38)

In Windows Server 2003 event viewer, an informational message such as a notice that a service has been started is prefaced by a black "!" (exclamation point) that appears on a yellow caution symbol.

(True/False)
4.8/5
(39)

Is the Process Viewer used by Linux Red Hat 9.x to display a listing of processes and the users who are running those processes?

(True/False)
4.9/5
(38)

Are the Server logs for Mac OS X automatically rotated?

(True/False)
4.9/5
(26)
Showing 41 - 60 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)