Exam 18: Security Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Data representing behavior that does not trigger an alarm cannot serve as input to intrusion detection analysis.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

Data items to capture for a security audit trail include:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

The audit analyzer prepares human-readable security reports.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

False

The foundation of a security auditing facility is the initial capture of the audit data.

(True/False)
4.9/5
(35)

Applications,especially applications with a certain level of privilege, present security problems that may not be captured by system-level or user-level auditing data.

(True/False)
4.8/5
(31)

The basic audit objective is to establish accountability for system entities that initiate or participate in security-relevant events and actions.

(True/False)
4.8/5
(32)

Although important,security auditing is not a key element in computer security.

(True/False)
4.8/5
(30)

_________ identifies the level of auditing,enumerates the types of auditable events,and identifies the minimum set of audit-related information provided.

(Multiple Choice)
4.8/5
(22)

According to ISO 27002,the person(s)carrying out the audit should be independent of the activities audited.

(True/False)
4.8/5
(31)

Windows allows the system user to enable auditing in _______ different categories.

(Multiple Choice)
4.8/5
(30)

Means are needed to generate and record a security audit trail and to review and analyze the audit trail to discover and investigate attacks and security compromises.

(True/False)
5.0/5
(35)

______ is UNIX's general-purpose logging mechanism found on all UNIX variants and Linux.

(Short Answer)
4.9/5
(32)

Messages in the BSD syslog format consist of three parts: PRI,Header,and ___.

(Short Answer)
4.9/5
(35)

A _________is a chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation,procedure,or event in a security-relevant transaction from inception to final results.

(Short Answer)
4.7/5
(31)

Thresholding is a form of baseline analysis.

(True/False)
4.9/5
(30)

With _________ the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected.

(Multiple Choice)
4.8/5
(40)

The security administrator must define the set of events that are subject to audit.

(True/False)
4.7/5
(30)

All UNIX implementations will have the same variants of the syslog facility.

(True/False)
4.8/5
(32)

System conditions requiring immediate attention is a(n)_______ severity.

(Multiple Choice)
4.8/5
(30)

Monitoring areas suggested in ISO 27002 include: authorized access,all privileged operations,unauthorized access attempts,changes to (or attempts to change)system security settings and controls,and __________.

(Short Answer)
4.8/5
(34)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)