Create a hash of each log what does hashing of log

Info icon This preview shows pages 9–11. Sign up to view the full content.

Create a hash of each log. What does hashing of log files provide? Proof that the files have not been altered Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts has occurred. Which log type should you check? System You have heard about a Trojan horse program where the compromised system sends personal information to a remote attacker on a specific TCP port. You want to be able to easily tell whether any of your systems are sending data to the attacker. Which log would you monitor? Firewall Which of the following is a standard for sending log messages to a central logging server? Syslog You suspect that some of your computers have been hijacked and are being used to perform denial of service attacks directed against other computers on the Internet. Firewall You suspect that your Web server has been the target of a denial of service attack. You would like to view information about the number of connections to the server over the past three days. Which log would you most likely examine? Performance You are concerned that an attacker can gain access to your Web server, make modifications to the system, and alter the log files to hide his actions. Which of the following actions would best protect the log files? Use syslog to send log entries to another server
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

You decide to use syslog to send entries from multiple servers to a central logging server. Which of the following are the most important considerations for your implementation? (Select two.) Disk space on the syslog server Clock synchronization between all devices Which of the following best describes an audit daemon ? The trusted utility that runs a background process whenever auditing is enabled. Which of the following is not included in a system level audit event? (Select two.) Any actions performed by the user. Names of accessed files. The auditing feature of an operating system serves as what form of control when users are informed that their actions are being monitored? Preventative What is the purpose of audit trails? Detect security-violating events Which of the following is a collection of recorded data that may include details about logons, objective access, and other activities deemed important by your security policy that is often used detect unwanted and unauthorized user activity? Audit trail A recreation of historical events is made possible through? Audit trails Section 7.9.7 Which of the following is not an advantage when using an internal auditor to examine security systems and relevant documentation? Findings in the audit and subsequent summations are viewed objectively. Properly configured passive IDS and system audit logs are an integral part of a comprehensive security plan. Which step must be taken to ensure that the information is useful in maintaining a secure environment?
Image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern