Exam 18: Security Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The basic audit objective is to establish accountability for systementities that initiate or participate in security-relevant events and actions.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

True

Windows is equipped with three types of event logs: system event log, security event log, and ________ event log.

Free
(Short Answer)
4.8/5
(30)
Correct Answer:
Verified

application

A _______ is an independent review and examination of a system's records and activities.

Free
(Short Answer)
4.9/5
(44)
Correct Answer:
Verified

security audit

______ software is a centralized logging software package similar to, but much more complex than, syslog.

(Multiple Choice)
4.7/5
(28)

Windows allows the system user to enable auditing in _______ different categories.

(Multiple Choice)
5.0/5
(31)

Monitoring areas suggested in ISO 27002 include: authorized access, all privileged operations, unauthorized access attempts, changes to (or attempts to change) system security settings and controls, and __________.

(Short Answer)
4.8/5
(33)

The ________ is a module that transmits the audit trail records from its local system to the centralized audit trail collector.

(Multiple Choice)
4.8/5
(41)

The foundation of a security auditing facility is the initial capture ofthe audit data.

(True/False)
4.9/5
(35)

Severe messages, such as immediate system shutdown, is a(n) _____ severity.

(Multiple Choice)
4.7/5
(34)

The ________ is a module on a centralized system that collects audit trail records from other systems and creates a combined audit trail.

(Multiple Choice)
4.7/5
(37)

Applications, especially applications with a certain level of privilege,present security problems that may not be captured by system-level or user-level auditing data.

(True/False)
4.8/5
(30)

Although important, security auditing is not a key element in computersecurity.

(True/False)
4.9/5
(36)

All UNIX implementations will have the same variants of the syslogfacility.

(True/False)
4.8/5
(36)

The ________ is an application or user who examines the audit trail and the audit archives for historical trends, for computer forensic purposes, and for other analysis.

(Short Answer)
4.9/5
(30)

_________ is a form of auditing that focuses on the security of an organization's IT assets.

(Short Answer)
4.8/5
(29)

_________ audit trails are generally used to monitor and optimize system performance.

(Multiple Choice)
4.8/5
(34)

Data items to capture for a security audit trail include:

(Multiple Choice)
4.8/5
(35)

A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.

(Multiple Choice)
4.8/5
(41)

Audit trails are different from audit logs.

(True/False)
4.8/5
(35)

________ audit trail traces the activity of individual users over time and can be used to hold a user accountable for his or her actions.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)