d. Assessing the effectiveness of reducing security incidents
147. Which of the following security control techniques assists system administrators in protecting physical access of computer systems by intruders?
a. Access control lists
b. Host-based authentication
c. Centralized security administration
d. Keystroke monitoring
Access control lists refer to a register of users who have been given permission to use a particular system resource and the types of access they have been permitted. Host-based authentication grants access based upon the identity of the host originating the request, instead of the identity of the user making the request. Centralized security administration allows control over information because the ability to make changes resides with few individuals, as opposed to many in a decentralized environment. The other three choices do not protect computer systems from intruders, as does the keystroke monitoring.
148. Which of the following is
a. System audits
b. System changes
c. Policies and procedures
d. System monitoring
To maintain operational assurance, organizations use three basic methods: system audits, policies and procedures, and system monitoring. A system audit is a one-time or periodic event to evaluate security. Monitoring refers to an ongoing activity that examines either the system or the users. In general, the more real time an activity is, the more it falls into the category of monitoring. Policies and procedures are the backbone for both auditing and monitoring.
System changes drive new requirements for changes. In response to various events such as user complaints, availability of new features and services, or the discovery of new threats and vulnerabilities, system managers and users modify the system and incorporate new features, new procedures, and software updates. System changes by themselves do not assure that controls are working properly.
149. What is an example of a security policy that can be legally monitored?
a. Keystroke monitoring
b. Electronic mail monitoring
c. Web browser monitoring
d. Password monitoring
150. What is a common security problem?
a. Discarded storage media
b. Telephone wiretapping
c. Intelligence consultants
d. Electronic bugs
151. When controlling access to information, an audit log provides which of the following?
a. Review of security policy
b. Marking files for reporting
c. Identification of jobs run
d. Accountability for actions