Answer the following statements true (T) or false (F)

1. Protection of the audit trail involves both integrity and confidentiality.
2. The foundation of a security auditing facility is the initial capture of
the audit data.
3. All UNIX implementations will have the same variants of the syslog
facility.
4. Thresholding is a form of baseline analysis.
5. Applications, especially applications with a certain level of privilege,
present security problems that may not be captured by system-level or user-level auditing data.



1. True
2. True
3. Fa;se
4. Trie
5. True

Computer Science & Information Technology

You might also like to view...

To ________ data means to consolidate or summarize data, and can be accomplished through functions such as SUM and AVERAGE

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed?

A. MMS B. convertible C. point-and-shoot D. SLR

Computer Science & Information Technology

Which of the following is a filter you could find in the Filter Gallery?

a. Diffuse Glow b. Poster Edges c. Glowing Edges d. all of the above

Computer Science & Information Technology

Of the three, PAP, CHAP, and MS-CHAP, ____________________ offers the most security for dial-up authentication.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology