Deck 12: Incident Analysis

ملء الشاشة (f)
exit full mode
سؤال
Windows logs are also known as

A) Microsoft logs
B) Application logs
C) Operating system logs
D) Event logs
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Syslog.conf line *.info /tmp/messages is interpreted to mean

A) Send info messages from all services to the /tmp/messages file
B) Send all log messages from all services to the /tmp/messages file
C) Send all log messages from all services to the default log file location
D) Send info messages from select services to the /tmp/messages file
سؤال
Information about users currently logged into the system is recorded in

A) authlog
B) wtmp
C) messages
D) utmp
سؤال
Syslog.conf line mail.crit /tmp/messages is interpreted to mean

A) Send all log messages from the mail service to the /tmp/messages file
B) Send critical log messages from the mail service to the /tmp/messages file
C) Send all log messages from the mail service to the /tmp/messages file
D) Send critical log messages from the mail service to the default log file location
سؤال
Developers use logs to

A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Monitor disk space requirements of applications
D) Ensure optimum performance of the application
سؤال
In Windows, login and logout attempts are recorded by default in the

A) Application log
B) Security log
C) System event log
D) Forwarded events log
سؤال
Syslog selectors are composed of

A) Information, warning
B) Facility, priority
C) Event logs, application logs
D) Syslog, logmon
سؤال
The simplest way to determine when the system was last rebooted is to look at the output from

A) authlog
B) wtmp
C) last
D) utmp
سؤال
Security administrators use logs to

A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Monitor disk space requirements of applications
D) Ensure optimum performance of the application
سؤال
When investigating an incident on a Unix/ Linux system, generally the first file to be examined is

A) wtmp
B) utmp
C) authlog
D) messages
سؤال
System administrators use logs to

A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Ensure optimum performance of the application
D) Refine the code base of applications
سؤال
Syslog facilities include all of the following except

A) auth
B) cron
C) kern
D) debug
سؤال
Syslog priorities include all of the following except

A) debug
B) error
C) audit
D) panic
سؤال
The application log in Windows will contain logging information from all of the following except

A) Internet Information Services
B) Microsoft Office
C) Video games
D) Databases
سؤال
Login attempts on a Unix/ Linux system are recorded in

A) authlog
B) messages
C) wtmp
D) utmp
سؤال
Historical login and logout attempts on a Unix/ Linux system are recorded in

A) authlog
B) wtmp
C) messages
D) utmp
سؤال
Event criticality in Windows logs is indicated by labels including

A) Urgent, notice
B) Notice, warning
C) Critical, urgent
D) Information, warning
سؤال
The Unix logging facility is called

A) Syslog
B) Defcon
C) Event logs
D) Logmon
سؤال
A common default location for Linux syslog messages is

A) /tmp/messages
B) /etc/log/messages
C) /var/log/messages
D) /messages
سؤال
In Windows, operating system log messages are recorded in the

A) Application log
B) Security log
C) System event log
D) Forwarded events log
سؤال
In IT, BYOD stands for

A) Bring your own drink
B) Buy your own drink
C) Buy your own dress'
D) Bring your own device
سؤال
File timestamps can be useful for all of the following except

A) Identifying files manipulated by the hacker
B) Determine how the hacker compromised the system
C) Identifying the attacker
D) Preventing similar attacks on other similar systems
سؤال
File timestamps are known as MAC timestamps, where MAC stands for

A) Medium access control
B) Modification, access, creation
C) Multiple account creation
D) Media, agent and creativity
سؤال
During incident response, volatile data refers to

A) Data that will be lost during reboot
B) Data that is changing rapidly
C) Data generated by end users during normal use of the system
D) Data generated by a temperamental user
سؤال
Cloud storage adds complexity to the work of security administrators
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Incident Analysis
1
Windows logs are also known as

A) Microsoft logs
B) Application logs
C) Operating system logs
D) Event logs
D
2
Syslog.conf line *.info /tmp/messages is interpreted to mean

A) Send info messages from all services to the /tmp/messages file
B) Send all log messages from all services to the /tmp/messages file
C) Send all log messages from all services to the default log file location
D) Send info messages from select services to the /tmp/messages file
A
3
Information about users currently logged into the system is recorded in

A) authlog
B) wtmp
C) messages
D) utmp
D
4
Syslog.conf line mail.crit /tmp/messages is interpreted to mean

A) Send all log messages from the mail service to the /tmp/messages file
B) Send critical log messages from the mail service to the /tmp/messages file
C) Send all log messages from the mail service to the /tmp/messages file
D) Send critical log messages from the mail service to the default log file location
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Developers use logs to

A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Monitor disk space requirements of applications
D) Ensure optimum performance of the application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
In Windows, login and logout attempts are recorded by default in the

A) Application log
B) Security log
C) System event log
D) Forwarded events log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Syslog selectors are composed of

A) Information, warning
B) Facility, priority
C) Event logs, application logs
D) Syslog, logmon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
The simplest way to determine when the system was last rebooted is to look at the output from

A) authlog
B) wtmp
C) last
D) utmp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Security administrators use logs to

A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Monitor disk space requirements of applications
D) Ensure optimum performance of the application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
When investigating an incident on a Unix/ Linux system, generally the first file to be examined is

A) wtmp
B) utmp
C) authlog
D) messages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
System administrators use logs to

A) Analyze security incidents
B) Ensure that the application is behaving as expected
C) Ensure optimum performance of the application
D) Refine the code base of applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Syslog facilities include all of the following except

A) auth
B) cron
C) kern
D) debug
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
Syslog priorities include all of the following except

A) debug
B) error
C) audit
D) panic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
The application log in Windows will contain logging information from all of the following except

A) Internet Information Services
B) Microsoft Office
C) Video games
D) Databases
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Login attempts on a Unix/ Linux system are recorded in

A) authlog
B) messages
C) wtmp
D) utmp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Historical login and logout attempts on a Unix/ Linux system are recorded in

A) authlog
B) wtmp
C) messages
D) utmp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
Event criticality in Windows logs is indicated by labels including

A) Urgent, notice
B) Notice, warning
C) Critical, urgent
D) Information, warning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
The Unix logging facility is called

A) Syslog
B) Defcon
C) Event logs
D) Logmon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
A common default location for Linux syslog messages is

A) /tmp/messages
B) /etc/log/messages
C) /var/log/messages
D) /messages
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
In Windows, operating system log messages are recorded in the

A) Application log
B) Security log
C) System event log
D) Forwarded events log
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
In IT, BYOD stands for

A) Bring your own drink
B) Buy your own drink
C) Buy your own dress'
D) Bring your own device
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
File timestamps can be useful for all of the following except

A) Identifying files manipulated by the hacker
B) Determine how the hacker compromised the system
C) Identifying the attacker
D) Preventing similar attacks on other similar systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
File timestamps are known as MAC timestamps, where MAC stands for

A) Medium access control
B) Modification, access, creation
C) Multiple account creation
D) Media, agent and creativity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
During incident response, volatile data refers to

A) Data that will be lost during reboot
B) Data that is changing rapidly
C) Data generated by end users during normal use of the system
D) Data generated by a temperamental user
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Cloud storage adds complexity to the work of security administrators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.