Security auditing can:
A) provide data that can be used to define anomalous behavior
B) maintain a record useful in computer forensics
C) generate data that can be used in after-the-fact analysis of an attack
D) all of the above
Correct Answer:
Verified
Q10: The basic audit objective is to establish
Q11: Audit trails are different from audit logs.
Q12: Means are needed to generate and record
Q13: The audit analyzer prepares human-readable security reports.
Q14: The _ is logic embedded into the
Q16: Event and audit trail analysis software, tools,
Q17: The foundation of a security auditing facility
Q18: Protection of the audit trail involves both
Q19: According to ISO 27002, the person(s) carrying
Q20: The _ is a module that transmits
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents