单选题A timely review of system access audit records would be an example of which of the basic security functions? 及时的复审系统访问审计记录是以下哪个安全功能的例子?()Aprevention.预防Bavoidance.避免Cdetection.检测Ddeterrence.威慑

单选题
A timely review of system access audit records would be an example of which of the basic security functions? 及时的复审系统访问审计记录是以下哪个安全功能的例子?()
A

prevention.预防

B

avoidance.避免

C

detection.检测

D

deterrence.威慑


参考解析

解析: 暂无解析

相关考题:

(c) With specific reference to Hugh Co, discuss the objective of a review engagement and contrast the level ofassurance provided with that provided in an audit of financial statements. (6 marks)

Did you get the financial records _______ shape for your audit next month? A into ;B in ;C from

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT

User programs interact with the kernel through a set of standard(71). They request services to be provided by the kernel. Such services would include accessing a file: open close, read, write, link, or execute a file; starting or(72)accounting records; changing ownership of a file or(73); changing to a new directory; creating,(74), or killing a process; enabling access to hardware devices; and setting limits on system resources. Unix is a multi -user, multi -tasking operating system. You can have many users logged into a system simultaneously, each running many programs. It's the kernel's job to keep each process and user separate and to regulate access to(75), including cpu, memory, disk and other L/O devices.A.system commandsB.system transferC.system callsD.system rings

In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? () A. Take a System SnapshotB. Configure LicensingC. Review the EventsD. Set the date and timeE. Upgrade or downgrade the firmware

A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company‘s intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server.Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()A. Perform a policy trace for the specific user and review the output to isolate the problem.B. Review the Events log.C. Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.D. Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

Is the following statement true or false?A significant change in the ownership of an existing audit client is a factor which makes it appropriate for the auditor to review the terms of engagement.A.TrueB.False

The new communication system is by no means a minute invention.A:smallB:accidentalC:significantD:timely

The senior citizen would have beenkilled ______ the timely arrival of the rescue team.A.except for B.but forC.besides D.except

A timely review of system access audit records would be an example of which of the basic security functions? 及时的复审系统访问审计记录是以下哪个安全功能的例子?()A、prevention.预防B、avoidance.避免C、detection.检测D、deterrence.威慑

Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()A、Remote DebuggingB、System SnapshotC、User Access logsD、Policy Tracing

Which statement correctly describes the change tracking writer (CTWR) background process?()A、 It keeps track of changes in the background processes.B、 It records the system change number (SCN) in the control file.C、 It writes audit records for user changes to the change tracking file.D、 It records any changes to the listened configuration in the listener.ora file.E、 It records any changes to the database parameters in the change tracking file.F、 It records the physical location of all the changes that are made to the database in the change tracking file.

In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()A、Take a "System Snapshot"B、Configure "Licensing"C、Review the "Events"D、Set the date and timeE、Upgrade or downgrade the firmware

A company just hired a new plant maintenance manager, and they are concerned about the number of corrupt asset records in the present system. In future they want to prevent this from happening. When implementing the new solution, what is recommended?()A、All maintenance personnel have full access to all records.B、All maintenance personnel have read-only access to all data. C、Only a very limited number of personnel have full access to static data records, but all maintenance personnel are able to enter work order data.D、Maintenance personnel should not be using the system, and should only write entries on printed work orders and hire input clerks to enter these into the system.

How would a system administrator review root’s current cron jobs of the following?()A、crontab -lB、cron -l rootC、lscron -l rootD、cat /var/cron/crontabs/root

During the pre-installation planning of a customer’s recently purchased IBM System Storage DS8700 the port configuration, cabling, and disk layout were discussed.  What other topic should be discussed in this solution review()A、LPAR capacity planningB、logical volume configurationC、data migration processD、audit hosts for HBA worldwide port names

When you try to open your database, you receive the following error:  ORA-00205: error in identifying control file   Where would you find the details required to resolve this error?()A、audit trailB、alert log fileC、user trace fileD、online trace fileE、background trace fileF、operating system event viewer

You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT

You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.   You need to audit the deletion of registry keys on each server.   What should you do()A、From Audit Policy, modify the Object Access settings and the Process Tracking settings.B、From Audit Policy, modify the System Events settings and the Privilege Use settings.C、From Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking  settings.D、From Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object  Access Auditing settings.

单选题You have a computer that runs Windows 7. You need to identify which applications were installed during thelast week.  What should you do?()AFrom Reliability Monitor, review the informational events.BFrom System Information, review the Software Environment.CFrom Performance Monitor, review the System Diagnostics Report.DFrom Performance Monitor, run the System Performance Data Collector Set.

单选题Your network contains an Active Directory domain. All servers run Windows Server 2008 R2.     You need to audit the deletion of registry keys on each server.     What should you do()AFrom Audit Policy, modify the Object Access settings and the Process Tracking settings.BFrom Audit Policy, modify the System Events settings and the Privilege Use settings.CFrom Advanced Audit Policy Configuration, modify the System settings and the Detailed Tracking settings.DFrom Advanced Audit Policy Configuration, modify the Object Access settings and the Global Object Access Auditin

单选题Your company has an Active Directory directory service domain. All servers run Windows Server 2003. You are developing a security monitoring plan. You must monitor the files that are stored in a specific directory on a member server. You have the following requirements. Log all attempts to access the files.Retain log information until the full weekly backup occurs. You need to ensure that the security monitoring plan meets the requirements.  What should your plan include?()A Configure a directory service access audit policy. Increase the maximum size of the security log.B Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.C Configure an object access audit policy for the directory. Increase the maximum size of the system log.D Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.

单选题The SAVE_AMT column in the ACCOUNTS table contains the balance details of customers in a bank. As part of the year-end tax and interest calculation process, all the rows in the table need to be accessed. The bank authorities want to track access to the rows containing balance amounts exceeding $200,000, and then send an alert message to the administrator. Which method would you suggest to the bank for achieving this task?()Aimplementing value-based auditing by using triggersBimplementing fine-grained auditing with audit condition and event handlerCperforming standard database auditing to audit object privileges by setting the AUDIT_TRAIL parameter to EXTENDEDDperforming standard database auditing to audit SQL statements with granularity level set to ACCESS

单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()AStart the System Event Notification Service (SENS) on TK1.BStart the Error Reporting service on TK1.CModify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.DModify GPO1 by selecting Success and Failure as the Audit Object Access setting.

多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

单选题You are an administrator at Certkiller .com. Certkiller has a network of 5 member servers acting as file servers. It has an Active Directory domain. You have installed a software application on the servers. As soon as the application is installed, one of the member servers shuts down itself. To trace and rectify the problem, you create a Group Policy Object (GPO). You need to change the domain security settings to trace the shutdowns and identify the cause of it. What should you do to perform this task()ALink the GPO to the domain and enable System Events optionBLink the GPO to the domain and enable Audit Object Access optionCLink the GPO to the Domain Controllers and enable Audit Object Access optionDLink the GPO to the Domain Controllers and enable Audit Process tracking optionEPerform all of the above actions