Testing file settings, testing configuration settings, and reviewing patch logs are routine tasks a less experienced administrator or security officer can perform.
Scenario-Based Questions, Answers, and Explanations
Use the following information to answer questions 1 through 8.
The GRO Company will face an audit by a federal regulatory body in 30 days. The last update for its policies and procedures was made one year ago after the last audit. It has 50% of the controls in place described in the last audit, and 45% will be turned on before the auditors arrive. The remaining 5% of controls (audit trail software for computer operating systems) will break the financial systems if turned on for more than one hour.
1. Who initiates audit trails in computer systems?
a. Functional users
b. System auditors
c. System administrators
d. Security administrators
2. An inexpensive security measure is which of the following?
a. Firewalls
b. Intrusion detection
c. Audit trails
d. Access controls
3. What is an audit trail an example of?
a. Recovery control
b. Corrective control
c. Preventive control
d. Detective control
4. Which of the following statements is
a. There is interdependency between audit trails and security policy.
b. If a user is impersonated, the audit trail will establish events and the identity of the user.
c. Audit trails can assist in contingency planning.
d. Audit trails can be used to identify breakdowns in logical access controls.
It is true that there is interdependency between audit trails and security policy. Policy dictates who has authorized access to particular system resources. Therefore it specifies, directly or indirectly, what violations of policy should be identified through audit trails.
It is true that audit trails can assist in contingency planning by leaving a record of activities performed on the system or within a specific application. In the event of a technical malfunction, this log can be used to help reconstruct the state of the system (or specific files).
It is true that audit trails can be used to identify breakdowns in logical access controls. Logical access controls restrict the use of system resources to authorized users. Audit trails complement this activity by identifying breakdowns in logical access controls or verifying that access control restrictions are behaving as expected.