Guide to Network Security

Computing

Quiz 10 :

Auditing, Monitoring, and Logging

Quiz 10 :

Auditing, Monitoring, and Logging

Question Type
search
arrow
As part of the initiation and planning audit phase, it is customary for a(n) ____ to be developed, which serves as a service agreement between the auditing team and the requesting entity.
Free
Multiple Choice
Answer:

Answer:

C

Tags
Choose question tag
close menu
arrow
Logs provide dynamic records of running processes.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
In Microsoft Windows-based systems, you can use the ____ to manage event logs from the command line.
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
____ are processes that are designed to operate without user interaction.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
COBIT provides a framework to support information security requirements and assessment needs.
True False
Answer:
Tags
Choose question tag
close menu
arrow
The basic operation of a system logging facility is to collects events from log files, processes the data, stores the results, and performs notification or alerting, as required.
True False
Answer:
Tags
Choose question tag
close menu
arrow
The purpose of ____ is to manage the effects of changes or differences in configurations on an information system or network.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A(n) ____ is a task being performed by a computing system.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
On most current versions of Microsoft Windows-based systems, logging is managed by the ____, which is accessible from the system control panel.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Tracking events in which group membership has changed or rights have been elevated gives security professionals a warning that ____ is occurring.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
In the Windows OS, services are usually initiated (loaded or started) at boot-up as ____, which consist of software code, data and/or other resources necessary to provide the service.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A spreadsheet program might record an error for access to a file in the ____ log.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Most system logs are very difficult to collect, store, read, and understand.
True False
Answer:
Tags
Choose question tag
close menu
arrow
You can view Ubuntu Linux distribution daemons using the ____.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
What is logged in the system log is predetermined by Windows.
True False
Answer:
Tags
Choose question tag
close menu
arrow
From a network security perspective, the ____ logs are the most valuable to a systems and network administrator in identifying and resolving issues.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which Linux file records all logins and logouts that occur on the system?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
To investigate running processes, we would turn to the ____ in Linux.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Within the change management process, after the need for a change has been identified, a(n) ____ is submitted to the appropriate decision-making body.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Which Linux file shows a listing of failed login attempts?
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 50