d.
Multiple identification63. From a log management perspective, logon attempts to an application are recorded in which of the following logs?
1.
Audit log2.
Authentication log3.
Event log4.
Error loga.
1 onlyb.
2 onlyc.
1 and 2d.
3 and 4Event log entries typically list all actions that were performed, the date and time each action occurred, and the result of each action. Error logs record information regarding application errors, typically with timestamps. Error logs are helpful in troubleshooting both operational issues and attacks. Error messages can be helpful in determining when an event of interest occurred and identifying important characteristics of the event.
64. From a log management perspective, which of the following provides more information on the results of each action recorded into an application event log?
a.
Date each action occurredb.
What status code was returned?c.
Time each action occurredd.
What username was used to perform each action?65. Spyware is often bundled with which of the following?
a.
P2P file sharing client programsb.
Network service wormsc.
Mass mailing wormsd.
E-mail-borne virusesNetwork service worms are incorrect because they spread by exploiting vulnerability in a network service associated with an operating system or an application. Mass mailing worms and e-mail-borne viruses are incorrect because mass mailing worms are similar to e-mail-borne viruses, with the primary difference being that mass mailing worms are self-contained instead of infecting an existing file as e-mail-borne viruses do. After a mass mailing worm has infected a system, it typically searches the system for e-mail addresses and then sends copies of itself to those addresses, using either the systems e-mail client or a self-contained mailer built into the worm itself.
66. Which of the following is
a.
Intrusion prevention system logsb.
Vulnerability management software logsc.
Network quarantine server logsd.
File sharing logs67. Which of the following logs are
a.
Network-based security software logsb.
Host-based security software logsc.
Operating system logsd.
Application system logsThe other three logs are not that beneficial when compared to the operating system logs. Both network-based and host-based security software logs contain basic security-related information such as user access profiles and access rights and permissions. Application system logs include e-mail logs, Web server logs, and file-sharing logs.