Multiple Choice
Security administrators use logs to
A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Monitor disk space requirements of applications
D) Ensure optimum performance of the application
Correct Answer:

Verified
Correct Answer:
Verified
Q8: The application log in Windows will contain
Q9: Historical login and logout attempts on a
Q10: Login attempts on a Unix/ Linux system
Q11: The Unix logging facility is called<br>A) Syslog<br>B)
Q12: Syslog.conf line *.info /tmp/messages is interpreted to
Q14: File timestamps are known as MAC timestamps,
Q15: In IT, BYOD stands for<br>A) Bring your
Q16: Event criticality in Windows logs is indicated
Q17: Windows logs are also known as<br>A) Microsoft
Q18: Syslog.conf line mail.crit /tmp/messages is interpreted to