Multiple Choice
Security auditing can:
A) provide data that can be used to define anomalous behavior
B) maintain a record useful in computer forensics
C) generate data that can be used in after-the-fact analysis of an attack
D) all of the above
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q18: A _ is conducted to determine the
Q19: Audit trails are different from audit logs.
Q20: _ audit trail traces the activity of
Q21: The audit analyzer prepares human-readable security reports.
Q22: Means are needed to generate and record
Q24: The first order of business in security
Q25: Protection of the audit trail involves both
Q26: System conditions requiring immediate attention is a(n)
Q27: _ is detection of events within a
Q28: Event and audit trail analysis software, tools,