What is the name given to the activity that consists of collecting information that will be later used for monitoring and review purposes?
a. Logging
b. Auditing
c. Inspecting
d. Vetting
Answer: A
Logging is the process of collecting data to be used for monitoring and auditing purposes. Auditing is the process of verification that normally involves going through log files; therefore, answer B is incorrect. Typically, the log files are frequently inspected, and inspection is not the process of collecting the data; therefore, answer C is incorrect. Vetting is the process of thorough examination or evaluation; therefore, answer D is incorrect.
Learn More :
Security and Vulnerability in the Network
- Your organization is exploring endpoint data-loss prevention (DLP) solutions. This solution is targeting which of the following data states?
- Which of the following serves the purpose of trying to lure a malicious attacker into a system?
- Adding a token for every POST or GET request that is initiated from the browser to the server can be used to mitigate which of the following attacks?
- Which of the following involves trying to get access to your system from an attacker's perspective?
- In which type of testing do you begin with the premise that an outsider attacker is being fed some knowledge from someone inside the network?
- What checks to make sure that things are operating status quo and that change detection is used to alert when modifications are made?
- Your manager has purchased a program intended to be used to find problems during code review. The program will read the code and look for any possible bugs or holes. What type of assessment is this known as?
- You want to implement MAC filtering on a small network but do not know the MAC address of a Windows-based workstation. Which command-line tool can you run on the workstation to find the MAC address?
- Which of the following is the area of an application that is available to users—those who are authenticated and more importantly those who are not?
- The approach a business takes to security is known as its:
- Nessus is a tool that performs which security function?
- Rule-based management defines conditions for access to objects and is also known as:
- In which type of testing do you begin with the premise that the attacker has inside knowledge of the network?
- Which of the following is a software application that checks your network for any known security holes?
- Which Windows workstation feature is accused of—sometimes inadvertently—making network bridging possible and introducing security concerns?
- The goal of _____ is to minimize the possibility of exploitation by reducing the amount of code and limiting potential damage.
- Which of the following is a protection feature built into many firewalls that allow the administrator to tweak the tolerance for unanswered login attacks?
- You want to implement MAC filtering on a small network but do not know the MAC address of a Linux-based workstation. Which command-line tool can you run on the workstation to find the MAC address?
- What are the two states that an application can fail in?
- During what process do you look at all custom written applications for holes that may exist (in the form of the finished application, configuration files, libraries, and so on)?
- Which log visible in Event Viewer shows successful and unsuccessful login attempts in Windows 7?
- Which IEEE standard is often referred to as EAP over LAN?
- In which type of testing do you begin with the premise that the attacker has no knowledge of the network?