Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which of the following best describes how operational logging is different from other logging types? It facilitates service provisioning and financial decisions. It is a

Which of the following best describes how operational logging is different from other logging types?

It facilitates service provisioning and financial decisions.

It is a part of security logging.

It concentrates on recording debugging logs.

It records logs about user login, unauthorized access to resources, and so on.

Question 2

Which of the following should be logged?

Encryption keys

Health information

Creation of system-level objects

Source code

Question 3

Which of the following best describes how the logging approach called local logging is different from its counterpart approach?

It works in four parts: log collection, transport, storage, and analysis.

It records changes to firewall policy.

It collects and aggregates logs in one central location.

It is used by systems that have a limited number of hosts.

Question 4

Which of the following best describes how the logging approach called centralized logging is different from its counterpart approach?

It generates logs for changes in firewall policy.

It generates a log record for exceeding thresholds.

It generates a log record for a successful or failed alteration of user access privileges.

It generates a log for a failed or successful modification of user credentials and access rights.

Question 5

In which of the following mechanisms does a system or device store its log data in a proprietary format?

Push-based mechanism

Syslog TCP

Syslog UDP

Pull-based mechanism

Question 6

Which of the following event types can describe a significant problem such as loss of data/functionality?

Error

Failure audit

Information

Warning

Question 7

Which of the following event types is of relatively low importance but may describe a possible future problem?

Failure audit

Warning

Information

Error

Question 8

Which of the following event types is recorded when a user cannot access a network drive?

Information

Warning

Failure audit

Error

Question 9

Which of the following types of event log entries is known as the mother of all logs in forensic terms?

Application

Security

Success audit

System

Question 10

Which of the following types of Windows event logs records a breakdown of Microsoft Excel?

Security event log

Application event log

System event log

Forwarded event log

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Issues In Database Management A Refernce For The Thinking Practitioner

Authors: Fabian Pascal

1st Edition

0201485559, 978-0201485554

More Books

Students also viewed these Databases questions