Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice
Quiz 18: Security Auditing
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
The foundation of a security auditing facility is the initial capture of the audit data.
Question 2
True/False
Although important,security auditing is not a key element in computer security.
Question 3
True/False
Data representing behavior that does not trigger an alarm cannot serve as input to intrusion detection analysis.
Question 4
True/False
According to ISO 27002,the person(s)carrying out the audit should be independent of the activities audited.
Question 5
Multiple Choice
The ________ is a module that transmits the audit trail records from its local system to the centralized audit trail collector.
Question 6
True/False
Protection of the audit trail involves both integrity and confidentiality.
Question 7
True/False
The security administrator must define the set of events that are subject to audit.
Question 8
True/False
The audit analyzer prepares human-readable security reports.
Question 9
True/False
Thresholding is a form of baseline analysis.
Question 10
True/False
Means are needed to generate and record a security audit trail and to review and analyze the audit trail to discover and investigate attacks and security compromises.
Question 11
Multiple Choice
The _________ is logic embedded into the software of the system that monitors system activity and detects security-related events that it has been configured to detect.
Question 12
Multiple Choice
A _______ is conducted to determine the adequacy of system controls,ensure compliance with established security policy and procedures,detect breaches in security services,and recommend any changes that are indicated for countermeasures.