Exam 18: Security Auditing
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The basic audit objective is to establish accountability for systementities that initiate or participate in security-relevant events and actions.
Free
(True/False)
4.9/5
(35)
Correct Answer:
True
Windows is equipped with three types of event logs: system event log, security event log, and ________ event log.
Free
(Short Answer)
4.8/5
(30)
Correct Answer:
application
A _______ is an independent review and examination of a system's records and activities.
Free
(Short Answer)
4.9/5
(44)
Correct Answer:
security audit
______ software is a centralized logging software package similar to, but much more complex than, syslog.
(Multiple Choice)
4.7/5
(28)
Windows allows the system user to enable auditing in _______ different categories.
(Multiple Choice)
5.0/5
(31)
Monitoring areas suggested in ISO 27002 include: authorized access, all privileged operations, unauthorized access attempts, changes to (or attempts to change) system security settings and controls, and __________.
(Short Answer)
4.8/5
(33)
The ________ is a module that transmits the audit trail records from its local system to the centralized audit trail collector.
(Multiple Choice)
4.8/5
(41)
The foundation of a security auditing facility is the initial capture ofthe audit data.
(True/False)
4.9/5
(35)
Severe messages, such as immediate system shutdown, is a(n) _____ severity.
(Multiple Choice)
4.7/5
(34)
The ________ is a module on a centralized system that collects audit trail records from other systems and creates a combined audit trail.
(Multiple Choice)
4.7/5
(37)
Applications, especially applications with a certain level of privilege,present security problems that may not be captured by system-level or user-level auditing data.
(True/False)
4.8/5
(30)
Although important, security auditing is not a key element in computersecurity.
(True/False)
4.9/5
(36)
All UNIX implementations will have the same variants of the syslogfacility.
(True/False)
4.8/5
(36)
The ________ is an application or user who examines the audit trail and the audit archives for historical trends, for computer forensic purposes, and for other analysis.
(Short Answer)
4.9/5
(30)
_________ is a form of auditing that focuses on the security of an organization's IT assets.
(Short Answer)
4.8/5
(29)
_________ audit trails are generally used to monitor and optimize system performance.
(Multiple Choice)
4.8/5
(34)
A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.
(Multiple Choice)
4.8/5
(41)
________ audit trail traces the activity of individual users over time and can be used to hold a user accountable for his or her actions.
(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)