Exam 18: Security Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A _______ is conducted to determine the adequacy of system controls,ensure compliance with established security policy and procedures,detect breaches in security services,and recommend any changes that are indicated for countermeasures.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

B

The ______ repository contains the auditing code to be inserted into an application.

Free
(Essay)
4.9/5
(35)
Correct Answer:
Verified

audit

Windows allows the system user to enable auditing in _______ different categories.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

With _________ the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected.

(Multiple Choice)
4.8/5
(39)

The audit _______ are a permanent store of security-related events on a system.

(Essay)
4.7/5
(42)

_________ is a form of auditing that focuses on the security of an organization's IS assets.

(Essay)
4.9/5
(31)

Security auditing can:

(Multiple Choice)
4.8/5
(28)

The basic audit objective is to establish accountability for system entities that initiate or participate in security-relevant events and actions.

(True/False)
4.8/5
(40)

Means are needed to generate and record a security audit trail and to review and analyze the audit trail to discover and investigate attacks and security compromises.

(True/False)
4.8/5
(35)

A _________is a chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation,procedure,or event in a security-relevant transaction from inception to final results.

(Essay)
4.9/5
(40)

________ audit trail traces the activity of individual users over time and can be used to hold a user accountable for his or her actions.

(Essay)
4.8/5
(26)

______ is the process of defining normal versus unusual events and patterns.

(Essay)
4.7/5
(27)

_________ audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system.

(Multiple Choice)
4.8/5
(35)

The first order of business in security audit trail design is the selection of data items to capture.

(True/False)
5.0/5
(32)

A _______ is an independent review and examination of a system's records and activities.

(Essay)
4.9/5
(31)

According to ISO 27002,the person(s)carrying out the audit should be independent of the activities audited.

(True/False)
4.9/5
(37)

Messages in the BSD syslog format consist of three parts: PRI,Header,and ___.

(Essay)
4.8/5
(31)

Although important,security auditing is not a key element in computer security.

(True/False)
4.9/5
(38)

Severe messages,such as immediate system shutdown,is a(n)_____ severity.

(Multiple Choice)
4.8/5
(42)

Event and audit trail analysis software,tools,and interfaces may be used to analyze collected data as well as for investigating data trends and anomalies.

(True/False)
4.9/5
(38)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)