Multiple Choice
File timestamps can be useful for all of the following except
A) Identifying files manipulated by the hacker
B) Determine how the hacker compromised the system
C) Identifying the attacker
D) Preventing similar attacks on other similar systems
Correct Answer:

Verified
Correct Answer:
Verified
Q1: In Windows, operating system log messages are
Q3: Syslog facilities include all of the following
Q4: Syslog priorities include all of the following
Q5: Information about users currently logged into the
Q6: When investigating an incident on a Unix/
Q7: System administrators use logs to<br>A) Analyze security
Q8: The application log in Windows will contain
Q9: Historical login and logout attempts on a
Q10: Login attempts on a Unix/ Linux system
Q11: The Unix logging facility is called<br>A) Syslog<br>B)