a. Japan
b. Korea
c. Taiwan
d. Thailand
162. Which of the following logs are useful for security monitoring?
a. Network-based security software logs
b. Host-based security software logs
c. Operating system logs
d. Application system logs
Both network-based and host-based security software logs contain basic security-related information such as user access profiles and access rights and permissions, which is not useful for security monitoring. Operating system logs collect information on servers, workstations, and network connectivity devices (e.g., routers and switches) that could be useful in identifying suspicious activity involving a particular host, but not useful for security monitoring.
163. From a computer security viewpoint, accountability of a person using a computer system is
a. Responsibility
b. Usability
c. Traceability
d. Accessibility
Responsibility is a broader term defining obligations and expected behavior. The term responsibility implies a proactive stance on the part of the responsible party and a casual relationship between the responsible party and a given outcome. The term accountability refers to the ability to hold people responsible for their actions. People could be responsible for their actions but not held accountable. For example, an anonymous user on a system is responsible for not compromising security but cannot be held accountable if a compromise occurs because the action cannot be traced to an individual.
Usability is incorrect because it deals with a set of attributes that bear on the effort needed for use, and on the individual assessment of such use, by a stated or implied set of users.
Accessibility is incorrect because it is the ability to obtain the use of a computer system or a resource or the ability and means necessary to store data, retrieve data, or communicate with a system. Responsibility, usability, and accessibility are not traceable to an individual’s actions.
164. Detection measures are needed to identify computer-related criminal activities. Which one of the following measures is reactive in nature?
a. Recording all login attempts
b. Checking the system logs
c. Notifying someone about system anomalies
d. Limiting the number of login attempts
165. Which one of the following is
a. Wiretapping
b. Eavesdropping
c. Superzapping
d. Masquerading