CYB 150 Wk 2 – Practice: Quiz

0 items
CYB 150 Wk 2 - Practice: Quiz
CYB 150 Wk 2 – Practice: Quiz
$5.00
  • Description

CYB 150 Wk 2 – Practice: Quiz

  1. Question 1

3/3

Which of the following best describes how operational logging is different from other logging types?

Hide answer choices

It facilitates service provisioning and financial decisions.

It is a part of security logging.

It concentrates on recording debugging logs.

It records logs about user login, unauthorized access to resources, and so on.

  1. Question 2

3/3

Which of the following should be logged?

Hide answer choices

Encryption keys

Health information

Creation of system-level objects

Source code

  1. Question 3

3/3

Which of the following best describes how the logging approach called “local logging” is different from its counterpart approach?

Hide answer choices

It works in four parts: log collection, transport, storage, and analysis.

It records changes to firewall policy.

It collects and aggregates logs in one central location.

It is used by systems that have a limited number of hosts.

  1. Question 4

3/3

Which of the following best describes how the logging approach called “centralized logging” is different from its counterpart approach?

Hide answer choices

It generates logs for changes in firewall policy.

It generates a log record for exceeding thresholds.

It generates a log record for a successful or failed alteration of user access privileges.

It generates a log for a failed or successful modification of user credentials and access rights.

  1. Question 5

3/3

In which of the following mechanisms does a system or device store its log data in a proprietary format?

Hide answer choices

Push-based mechanism

Syslog TCP

Syslog UDP

Pull-based mechanism

  1. Question 6

3/3

Which of the following event types can describe a significant problem such as loss of data/functionality?

Hide answer choices

Error

Failure audit

Information

Warning

  1. Question 7

3/3

Which of the following event types is of relatively low importance but may describe a possible future problem?

Hide answer choices

Failure audit

Warning

Information

Error

  1. Question 8

3/3

Which of the following event types is recorded when a user cannot access a network drive?

Hide answer choices

Information

Warning

Failure audit

Error

  1. Question 9

3/3

Which of the following types of event log entries is known as the mother of all logs in forensic terms?

Hide answer choices

Application

Security

Success audit

System

  1. Question 10

3/3

Which of the following types of Windows event logs records a breakdown of Microsoft Excel?

Hide answer choices

Security event log

Application event log

System event log

Forwarded event log