35. d.
Log parsing is converting log entries into a different format. For example, log parsing can convert an extensible markup language (XML)-format log into a plaintext file. Log parsing sometimes includes actions such as log filtering, log aggregation, log normalization, and log correlation. 36. Major categories of log management infrastructures are based on which of the following?
1.
Syslog-based centralized logging software2.
Security event management software3.
Network forensic analysis tools4.
Host-based intrusion detection systemsa.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 436. a.
Log management infrastructures are typically based on one of the two major categories of log management software: syslog-based centralized logging software and security event management (SEM) software. Network forensic analysis tools and host-based intrusion detection systems are examples of additional types (secondary sources) of log management software. 37. Regarding log management infrastructure functions, which of the following defines closing a log and opening a new log when the first log is considered to be complete?
a.
Log archivalb.
Log rotationc.
Log reductiond.
Log clearing37. b.
Log rotation is closing a log and opening a new log when the first log is considered to be complete. The primary benefits of log rotation are preserving log entries and keeping the size of logs manageable by compressing the log to save space. Logs can also be rotated through simple scripts and utility software. The other three logs do not provide rotation functions. 38. Regarding log management infrastructure functions, which one of the following is often performed with the other?
1.
Log archival2.
Log reduction3.
Log parsing4.
Log viewinga.
1 and 2b.
2 and 3c.
3 and 4d.
1, 2, 3, and 438. a.
Log reduction is removing unneeded entries or data fields from a log to create a new log that is smaller in size. Log reduction is often performed with log archival so that only the log entries of interest are placed into long-term storage. Log parsing and log viewing are two separate activities. 39. Which of the following is used to ensure that changes to archival logs are detected?
a.
Log file-integrity checking softwareb.
Network forensic analysis toolsc.
Visualization toolsd.
Log management utility software39. a.
To ensure that changes to archived logs are detected, log file-integrity checking can be performed with software. This involves calculating a message digest hash for each file and storing that message digest hash securely. The other three choices do not calculate a message digest. 40. Regarding log management infrastructure, which of the following characterizes the syslog-based centralized logging software?
1.
Single standard data format2.
Proprietary data formats3.
High resource-intensive for hosts4.
Low resource-intensive for hostsa.
1 and 3b.
1 and 4c.
2 and 3d.
2 and 440. b.
Syslog-based centralized logging software provides a single standard data format for log entry generation, storage, and transfer. Because it is simple in operation, it is less resource-intensive for hosts.41. Regarding log management infrastructure, which of the following
cannot take the place of others?1.
Network forensic analysis tools2.
Syslog-based centralized logging software3.
Host-based intrusion detection software4.
Security event management softwarea.
1 and 2b.
1 and 3c.
2 and 3d.
2 and 441. b.
The network forensic analysis tools and host-based intrusion detection software are often part of a log management infrastructure, but they cannot take the place of syslog-based centralized logging software and security event management software. Syslog-based centralized logging software and security event management software are used as primary tools whereas network forensic analysis tools and host-based intrusion detection software are used as additional tools. 42. Which of the following are major factors to consider when designing the organizational-level log management processes?
1.
Network bandwidth2.
Volume of log data to be processed3.
Configuration log sources4.
Performing log analysis