Auditing Security Activities: CSSLP Exam Answers

Auditing Security Activities

Question

Which of the following types of activities can be audited for security? Each correct answer represents a complete solution.

Choose three.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

be reviewed periodically.

Answer: B is incorrect.

Data downloading from the Internet cannot be audited.

The following types of activities can be audited: Network logons and logoffs File access Printer access Remote access service Application usage Network services Auditing is used to track user accounts for file and object access, logon attempts, system shutdown, etc.

This enhances the security of the network.

Before enabling security auditing, the type of event to be audited should be specified in the audit policy.

Auditing is an essential component to maintain the security of deployed systems.

Security auditing depends on the criticality of the environment and on the company's security policy.

The security system should.

Security audits are an essential part of securing a system or network. Audits enable the detection of potential security vulnerabilities and risks by analyzing logs and configurations. Different types of activities can be audited for security. The following are the explanations of the types of activities that can be audited for security:

A. File and object access: File and object access auditing is the process of monitoring the access to files and objects on a system. This auditing can help detect unauthorized attempts to access files and objects or unauthorized access. File and object access auditing is usually implemented using file system auditing tools that log every file and object access.

B. Data downloading from the Internet: Data downloading from the Internet auditing is the process of monitoring the data that is downloaded from the Internet to a system. This auditing can help detect malicious downloads or downloads of sensitive information. Data downloading from the Internet auditing can be implemented using network monitoring tools that log all network traffic and identify the source and destination of downloads.

C. Printer access: Printer access auditing is the process of monitoring the access to printers on a system. This auditing can help detect unauthorized attempts to print or print sensitive information. Printer access auditing can be implemented using printer auditing tools that log every print job and identify the user who printed the job.

D. Network logons and logoffs: Network logons and logoffs auditing is the process of monitoring the network logons and logoffs on a system. This auditing can help detect unauthorized access attempts or detect when an authorized user has logged off. Network logons and logoffs auditing can be implemented using network monitoring tools that log all network traffic and identify the source and destination of network logons and logoffs.

In conclusion, file and object access, data downloading from the Internet, and network logons and logoffs are the types of activities that can be audited for security. Printer access can also be audited for security, but it may not be as critical as the other three activities.