Security auditing can:
A flaw or weakness in a system's design, implementation, or operation...
A(n) _________ is an attempt to learn or make use of information from...
A________ level breach of security could be expected to have a severe...
From a security point of view, which of the following actions should...
Data items to capture for a security audit trail include
An assault on system security that derives from an intelligent act...
______ is a benefit of security awareness, training, and education...
A(n) __________ is an action, device, procedure, or technique that...
CERT stands for ___________.
An example of __________ is an attempt by an unauthorized user to gain...
__________ is the insertion of bits into gaps in a data stream to...
_______ are ways for an awareness program to promote the security...
A loss of _________ is the unauthorized disclosure of information.
Assures that a system performs its intended function in an unimpaired...
_________ audit trails may be used to detect security violations...
______ software is a centralized logging software package similar to,...
The _________ prevents or inhibits the normal use or management of...
A threat action in which sensitive data are directly released to an...
A __________ is any action that compromises the security of...
The assets of a computer system can be categorized as hardware,...
System conditions requiring immediate attention is a(n) _______...
A(n) _________ assessment is periodically assessing the risk to...
___________ scan critical system files, directories, and services to...
A _____________is a characteristic of a piece of technology that can...
________ is explicitly required for all employees
Security implementation involves four complementary courses of...
The assurance that data received are exactly as sent by an...
The ________ is a module on a centralized system that collects audit...
_________ audit trails are generally used to monitor and optimize...
Assures that individuals control or influence what information related...
The ________ is a module that transmits the audit trail records from...
Employees have no expectation of _________in their use of...
__________ involves an attempt to define a set of rules or attack...
A _________ is a security event that constitutes a security incident...
Security awareness, training, and education programs can serve as a...
Release of message contents and traffic analysis are two types of...
A(n) ________ is inserted into a network segment so that the traffic...
A _______ policy states that the company may access, monitor,...
_______are decoy systems that are designed to lure a potential...
Replay, masquerade, modification of messages, and denial of service...
_________ is a document that describes the application level protocol...
A(n) _________ is a threat that is carried out and, if successful,...
________ can include computer viruses, Trojan horse programs, worms,...
________ is the process of receiving, initial sorting, and...
Windows is equipped with three types of event logs: system event...
A capability set up for the purpose of assisting in responding to...
With _________ the linking to shared library routines is deferred...
___________is UNIX's general-purpose logging mechanism found on all...
The ______repository contains the auditing code to be inserted into an...
The rule _______ tells Snort what to do when it finds a packet that...
The group of users, sites, networks, or organizations served by the...
A loss of _________ is the disruption of access to or use of...
Severe messages, such as immediate system shutdown, is a(n)...
______ is the identification of data that exceed a particular baseline...
____ need training on the development of risk management goals, means...
Messages in the BSD syslog format consist of three parts: PRI,...
Windows allows the system user to enable auditing in _______ different...
Network and host _________________ monitor and analyze network and...
A _______ is conducted to determine the adequacy of system controls,...
_________________is detection of events within a given set of...
SIEM software has two general configuration approaches: ...
The _______ category is a transitional stage between awareness and...
A(n) __________is any file or object found on a system that might be...
The principal problems associated with employee behavior are errors...
Masquerade, falsification, and repudiation are threat actions that...
The _________ is logic embedded into the software of the system that...
There is a need for a continuum of learning programs that starts with...
A(n) _________ is any means taken to deal with a security attack.
A ______________ is an independent review and examination of a...
Misappropriation and misuse are attacks that result in ________ threat...
In large and medium-sized organizations, a _____________________ is...
__________ is the protection afforded to an automated information...
The _________ level focuses on developing the ability and vision to...
The OSI security architecture focuses on security attacks, __________,...
The ___________________is an application or user who examines the...
The goal of the _________function is to ensure that all information...
Confidentiality, Integrity, and Availability form what is often...
Any action that threatens one or more of the classic security services...
In general, a ________________ program seeks to inform and focus...
A __________ is data appended to, or a cryptographic transformation...
The audit ____________ are a permanent store of security-related...
__________ audit trail traces the activity of individual users over...
The ____________ is the predefined formally documented statement...
_________ identifies the level of auditing, enumerates the types of...
The principles that should be followed for personnel security...
In the United States, student grade information is an asset whose...
Establishing, maintaining, and implementing plans for emergency...
___________ is a form of auditing that focuses on the security of an...
___________ lists the following security objective with respect to...
RFC 2196 (Site Security Handbook) lists three alternatives for storing...
_______________is the process of defining normal versus unusual events...
The four layers of the learning continuum as summarized by NIST SP...
After security basics and literacy, training becomes focused on...
A _____________ is a chronological record of system activities...
Monitoring areas suggested in ISO 27002 include: authorized...