- Description
CYB 150 Wk 2 – Practice: Quiz
- Question 1
3/3
Which of the following best describes how operational logging is different from other logging types?
Hide answer choices
It facilitates service provisioning and financial decisions.
It is a part of security logging.
It concentrates on recording debugging logs.
It records logs about user login, unauthorized access to resources, and so on.
- Question 2
3/3
Which of the following should be logged?
Hide answer choices
Encryption keys
Health information
Creation of system-level objects
Source code
- Question 3
3/3
Which of the following best describes how the logging approach called “local logging” is different from its counterpart approach?
Hide answer choices
It works in four parts: log collection, transport, storage, and analysis.
It records changes to firewall policy.
It collects and aggregates logs in one central location.
It is used by systems that have a limited number of hosts.
- Question 4
3/3
Which of the following best describes how the logging approach called “centralized logging” is different from its counterpart approach?
Hide answer choices
It generates logs for changes in firewall policy.
It generates a log record for exceeding thresholds.
It generates a log record for a successful or failed alteration of user access privileges.
It generates a log for a failed or successful modification of user credentials and access rights.
- Question 5
3/3
In which of the following mechanisms does a system or device store its log data in a proprietary format?
Hide answer choices
Push-based mechanism
Syslog TCP
Syslog UDP
Pull-based mechanism
- Question 6
3/3
Which of the following event types can describe a significant problem such as loss of data/functionality?
Hide answer choices
Error
Failure audit
Information
Warning
- Question 7
3/3
Which of the following event types is of relatively low importance but may describe a possible future problem?
Hide answer choices
Failure audit
Warning
Information
Error
- Question 8
3/3
Which of the following event types is recorded when a user cannot access a network drive?
Hide answer choices
Information
Warning
Failure audit
Error
- Question 9
3/3
Which of the following types of event log entries is known as the mother of all logs in forensic terms?
Hide answer choices
Application
Security
Success audit
System
- Question 10
3/3
Which of the following types of Windows event logs records a breakdown of Microsoft Excel?
Hide answer choices
Security event log
Application event log
System event log
Forwarded event log