Match each item with a statement below.

A. Conducted using tools that are either installed onto a machine or embedded within an application for the purpose of recording the typical behavior of a system.
B. Conducted as a way to provide organizations evidence that their security policies and practices are effective and working properly.
C. Should include detailed information about the people, data, technology, and documents that will play a role within a particular audit.
D. Allows granular administration of system-wide auditing at both application and database layers in Oracle.
E. Conducted using a committee of individuals who are employees of the company itself.
F. A vital component to database security.
G. Most often conducted to satisfy specific industry standards that are required by law for certain types of organizations.
H. A privacy act that dictates which network security standards must be in place and effectively practiced in network environments that maintain and share sensitive medical records.
I. Conducted using a third-party group or a number of individuals from a source outside the organization itself.


A. automated audit
B. informal audit
C. perimeter
D. audit_trail function
E. internal audits
F. account administration
G. formal audit
H. HIPAA
I. external audit

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Path method isAbsolute returns a boolean indicating whether a Path represents an absolute path to a file or directory. b. Files static method getLastModifiedTime receives a Path and returns a FileTime (package java.nio.file.attribute) indicating when the file was last modified. c. Files static method size receives a Path and returns a long representing the number of bytes in the file or directory. For directories, the value returned is platform specific. d. All of the above are true.

Computer Science & Information Technology

What are the differences between point text and paragraph (or area) text?

What will be an ideal response?

Computer Science & Information Technology

After a template account has been created, what can be done to ensure that the template account does not pose a security risk?

A. The account should be placed in an isolated OU B. A specialized GPO should be applied to the OU the template account is located in, to limit risk C. The account should be disabled D. The account should be removed from the "Domain Users" group

Computer Science & Information Technology

The ____ mode tries to emulate the colors viewable by the human eye.

a. CMYK b. RGB c. LAB Color d. all of the above

Computer Science & Information Technology