Security auditing can:
A flaw or weakness in a system's design, implementation, or operation...
A(n) _________ is an attempt to learn or make use of information from...
A________ level breach of security could be expected to have a severe...
From a security point of view, which of the following actions should...
Data items to capture for a security audit trail include
An assault on system security that derives from an intelligent act...
______ is a benefit of security awareness, training, and education...
A(n) __________ is an action, device, procedure, or technique that...
CERT stands for ___________.
_______ are ways for an awareness program to promote the security...
__________ is the insertion of bits into gaps in a data stream to...
A loss of _________ is the unauthorized disclosure of information.
An example of __________ is an attempt by an unauthorized user to gain...
Assures that a system performs its intended function in an unimpaired...
_________ audit trails may be used to detect security violations...
______ software is a centralized logging software package similar to,...
The assets of a computer system can be categorized as hardware,...
A threat action in which sensitive data are directly released to an...
The _________ prevents or inhibits the normal use or management of...
System conditions requiring immediate attention is a(n) _______...
A __________ is any action that compromises the security of...
___________ scan critical system files, directories, and services to...
________ is explicitly required for all employees
A(n) _________ assessment is periodically assessing the risk to...
A _____________is a characteristic of a piece of technology that can...
The ________ is a module on a centralized system that collects audit...
Security implementation involves four complementary courses of...
The assurance that data received are exactly as sent by an...
_________ audit trails are generally used to monitor and optimize...
Assures that individuals control or influence what information related...
The ________ is a module that transmits the audit trail records from...
Security awareness, training, and education programs can serve as a...
A _________ is a security event that constitutes a security incident...
Employees have no expectation of _________in their use of...
A(n) ________ is inserted into a network segment so that the traffic...
__________ involves an attempt to define a set of rules or attack...
A _______ policy states that the company may access, monitor,...
A(n) _________ is a threat that is carried out and, if successful,...
Release of message contents and traffic analysis are two types of...
________ can include computer viruses, Trojan horse programs, worms,...
_________ is a document that describes the application level protocol...
_______are decoy systems that are designed to lure a potential...
Replay, masquerade, modification of messages, and denial of service...
________ is the process of receiving, initial sorting, and...
Windows is equipped with three types of event logs: system event...
A capability set up for the purpose of assisting in responding to...
The ______repository contains the auditing code to be inserted into an...
With _________ the linking to shared library routines is deferred...
____ need training on the development of risk management goals, means...
The rule _______ tells Snort what to do when it finds a packet that...
___________is UNIX's general-purpose logging mechanism found on all...
The group of users, sites, networks, or organizations served by the...
______ is the identification of data that exceed a particular baseline...
A loss of _________ is the disruption of access to or use of...
Severe messages, such as immediate system shutdown, is a(n)...
Windows allows the system user to enable auditing in _______ different...
Messages in the BSD syslog format consist of three parts: PRI,...
A _______ is conducted to determine the adequacy of system controls,...
Network and host _________________ monitor and analyze network and...
The _______ category is a transitional stage between awareness and...
SIEM software has two general configuration approaches: ...
_________________is detection of events within a given set of...
A(n) __________is any file or object found on a system that might be...
The _________ is logic embedded into the software of the system that...
The principal problems associated with employee behavior are errors...
Masquerade, falsification, and repudiation are threat actions that...
There is a need for a continuum of learning programs that starts with...
A(n) _________ is any means taken to deal with a security attack.
A ______________ is an independent review and examination of a...
Misappropriation and misuse are attacks that result in ________ threat...
The _________ level focuses on developing the ability and vision to...
In large and medium-sized organizations, a _____________________ is...
__________ is the protection afforded to an automated information...
The OSI security architecture focuses on security attacks, __________,...
The ___________________is an application or user who examines the...
The goal of the _________function is to ensure that all information...
Confidentiality, Integrity, and Availability form what is often...
Any action that threatens one or more of the classic security services...
In general, a ________________ program seeks to inform and focus...
A __________ is data appended to, or a cryptographic transformation...
The audit ____________ are a permanent store of security-related...
The ____________ is the predefined formally documented statement...
__________ audit trail traces the activity of individual users over...
_________ identifies the level of auditing, enumerates the types of...
The principles that should be followed for personnel security...
In the United States, student grade information is an asset whose...
Establishing, maintaining, and implementing plans for emergency...
___________ is a form of auditing that focuses on the security of an...
___________ lists the following security objective with respect to...
RFC 2196 (Site Security Handbook) lists three alternatives for storing...
_______________is the process of defining normal versus unusual events...
The four layers of the learning continuum as summarized by NIST SP...
After security basics and literacy, training becomes focused on...
A _____________ is a chronological record of system activities...
Monitoring areas suggested in ISO 27002 include: authorized...