Data items to capture for a security audit trail include:
a. events related to the security mechanisms on the system
b. operating system access
c. remote access
d. all of the above
b. operating system access
You might also like to view...
The ____ object constructor uses the spaces that separate words to split its String argument into substrings, and then stores each substring.
A. String B. StringContent C. StringHolder D. StringTokenizer
Which of the following is not a control structure:
a. Sequence structure. b. Selection structure. c. Iteration structure. d. Declaration structure.
A company wants to ensure that all aspects if data are protected when sending to other sites within the enterprise. Which of the following would ensure some type of encryption is performed while data is in transit?
A. SSH B. SHA1 C. TPM D. MD5
A troubleshooting activity where there is a current state of events X, a future desired state of events Y, and the troubleshooter's objective is to move from X to Y is called ____.
A. critical thinking B. an analogy C. problem solving D. a goal state