Question
Which of the following best describes how operational logging is different from other logging types? It facilitates service provisioning and financial decisions. It is a
Which of the following best describes how operational logging is different from other logging types?
It facilitates service provisioning and financial decisions.
It is a part of security logging.
It concentrates on recording debugging logs.
It records logs about user login, unauthorized access to resources, and so on.
Question 2
Which of the following should be logged?
Encryption keys
Health information
Creation of system-level objects
Source code
Question 3
Which of the following best describes how the logging approach called local logging is different from its counterpart approach?
It works in four parts: log collection, transport, storage, and analysis.
It records changes to firewall policy.
It collects and aggregates logs in one central location.
It is used by systems that have a limited number of hosts.
Question 4
Which of the following best describes how the logging approach called centralized logging is different from its counterpart approach?
It generates logs for changes in firewall policy.
It generates a log record for exceeding thresholds.
It generates a log record for a successful or failed alteration of user access privileges.
It generates a log for a failed or successful modification of user credentials and access rights.
Question 5
In which of the following mechanisms does a system or device store its log data in a proprietary format?
Push-based mechanism
Syslog TCP
Syslog UDP
Pull-based mechanism
Question 6
Which of the following event types can describe a significant problem such as loss of data/functionality?
Error
Failure audit
Information
Warning
Question 7
Which of the following event types is of relatively low importance but may describe a possible future problem?
Failure audit
Warning
Information
Error
Question 8
Which of the following event types is recorded when a user cannot access a network drive?
Information
Warning
Failure audit
Error
Question 9
Which of the following types of event log entries is known as the mother of all logs in forensic terms?
Application
Security
Success audit
System
Question 10
Which of the following types of Windows event logs records a breakdown of Microsoft Excel?
Security event log
Application event log
System event log
Forwarded event log
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started