Periodic reviews must be conducted to detect

Info icon This preview shows pages 10–13. Sign up to view the full content.

Periodic reviews must be conducted to detect malicious activity or policy violations. Which of the following describes Privilege auditing? Users’ and groups’ rights and privileges are checked to guard against creeping privileges.
Image of page 10

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Which of the following terms identifies the process of reviewing log files for suspicious activity and threshold compliance? Auditing Documents incidents for security violations and incident response. Usage auditing Identifies inefficient IT strategies, such as weak policies and procedures. Risk evaluation Verifies the appropriate use of accounts and privileges. Escalation auditing Checks user/group rights and privileges to identify cases of creeping privileges. Privilege auditing Determines whether privilege-granting processes are appropriate and whether computer use and escalation processes are in place and working. User access and rights review Section 7.9.7 Which of the following is not an advantage when using an internal auditor to examine security systems and relevant documentation? Findings in the audit and subsequent summations are viewed objectively. Properly configured passive IDS and system audit logs are an internal part of a comprehensive security plan. Which step must be taken to ensure that the information is useful in maintaining a secure environment? Periodic reviews must be conducted to detect malicious activity or policy violations. Which of the following describes Privilege auditing? Users’ and groups’ rights and privileges are checked to guard against creeping privileges. Which of the following terms identifies the process of reviewing log files for suspicious activity and threshold compliance? Auditing
Image of page 11
Documents incidents for security violations and incident response. Usage auditing Identifies inefficient IT strategies, such as weak policies and procedures. Risk evaluation Verifies the appropriate use of accounts and privileges. Escalation auditing Checks user/group rights and privileges to identify cases of creeping privileges. Privilege auditing Determines whether privilege-granting processes are appropriate and whether computer use and escalation processes are in place and working. User access and rights review Section 7.10.8 If an SMTP server is not properly and securely configured, it can be hijacked and used maliciously as an SMTP relay agent. Which activity could result if this happens? Spamming Which of the following could easily result in a denial of service attack if the victimized system had too little free storage capacity? Spam You have been receiving a lot of phishing emails sent from the domain Kenyan.msn.pl . Links within these emails open new browser windows at youneedit.com.pl . You want to make sure that these emails never reach your inbox, but you want to make sure that emails from other senders are not affected.
Image of page 12

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern