Exam 18: Security Auditing
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
A _______ is conducted to determine the adequacy of system controls,ensure compliance with established security policy and procedures,detect breaches in security services,and recommend any changes that are indicated for countermeasures.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
The ______ repository contains the auditing code to be inserted into an application.
Free
(Essay)
4.9/5
(35)
Correct Answer:
audit
Windows allows the system user to enable auditing in _______ different categories.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
C
With _________ the linking to shared library routines is deferred until load time so that if changes are made any program that references the library is unaffected.
(Multiple Choice)
4.8/5
(39)
The audit _______ are a permanent store of security-related events on a system.
(Essay)
4.7/5
(42)
_________ is a form of auditing that focuses on the security of an organization's IS assets.
(Essay)
4.9/5
(31)
The basic audit objective is to establish accountability for system
entities that initiate or participate in security-relevant events and actions.
(True/False)
4.8/5
(40)
Means are needed to generate and record a security audit trail and to
review and analyze the audit trail to discover and investigate attacks and security compromises.
(True/False)
4.8/5
(35)
A _________is a chronological record of system activities that is sufficient to enable the reconstruction and examination of the sequence of environments and activities surrounding or leading to an operation,procedure,or event in a security-relevant transaction from inception to final results.
(Essay)
4.9/5
(40)
________ audit trail traces the activity of individual users over time and can be used to hold a user accountable for his or her actions.
(Essay)
4.8/5
(26)
______ is the process of defining normal versus unusual events and patterns.
(Essay)
4.7/5
(27)
_________ audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system.
(Multiple Choice)
4.8/5
(35)
The first order of business in security audit trail design is the selection
of data items to capture.
(True/False)
5.0/5
(32)
A _______ is an independent review and examination of a system's records and activities.
(Essay)
4.9/5
(31)
According to ISO 27002,the person(s)carrying out the audit should be
independent of the activities audited.
(True/False)
4.9/5
(37)
Messages in the BSD syslog format consist of three parts: PRI,Header,and ___.
(Essay)
4.8/5
(31)
Although important,security auditing is not a key element in computer
security.
(True/False)
4.9/5
(38)
Severe messages,such as immediate system shutdown,is a(n)_____ severity.
(Multiple Choice)
4.8/5
(42)
Event and audit trail analysis software,tools,and interfaces may be
used to analyze collected data as well as for investigating data trends and anomalies.
(True/False)
4.9/5
(38)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)