Answer the following statements true (T) or false (F)
1. Protection of the audit trail involves both integrity and confidentiality.
2. The foundation of a security auditing facility is the initial capture of
the audit data.
3. All UNIX implementations will have the same variants of the syslog
facility.
4. Thresholding is a form of baseline analysis.
5. Applications, especially applications with a certain level of privilege,
present security problems that may not be captured by system-level or user-level auditing data.
1. True
2. True
3. Fa;se
4. Trie
5. True
You might also like to view...
To ________ data means to consolidate or summarize data, and can be accomplished through functions such as SUM and AVERAGE
Fill in the blank(s) with correct word
Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed?
A. MMS B. convertible C. point-and-shoot D. SLR
Which of the following is a filter you could find in the Filter Gallery?
a. Diffuse Glow b. Poster Edges c. Glowing Edges d. all of the above
Of the three, PAP, CHAP, and MS-CHAP, ____________________ offers the most security for dial-up authentication.
Fill in the blank(s) with the appropriate word(s).