Question 1 Which of the following is a risk that becomes important when using automatic blocking rules in Snort? Question 1 options: Some malicious activity may not be logged. Some legitimate activity may be logged. Some malicious activity may not be blocked. Some legitimate activity may be blocked. Question 2 Which of the following is not an advantage of sending syslog messages to a remote server? Question 2 options: It makes it more difficult for an attacker to tamper with the log entries. It makes it easier for the administrator to remove log entries. It can streamline forensic investigations. It can protect individual machines from exhausting local storage. Question 3 Which tool aggregates application and system events in a Windows environment? Question 3 options: Security Information and Event Management Windows Event Viewer Security, Orchestration, Automation, and Response system Syslog

LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN:9781337569798
Author:ECKERT
Publisher:ECKERT
Chapter12: Network Configuration
Section: Chapter Questions
Problem 10RQ
icon
Related questions
Question
100%

Question 1 

Which of the following is a risk that becomes important when using automatic blocking rules in Snort?

Question 1 options:

  Some malicious activity may not be logged.
  Some legitimate activity may be logged.
  Some malicious activity may not be blocked.
  Some legitimate activity may be blocked.

Question 2

 

Which of the following is not an advantage of sending syslog messages to a remote server?

Question 2 options:

  It makes it more difficult for an attacker to tamper with the log entries.
  It makes it easier for the administrator to remove log entries.
  It can streamline forensic investigations.
  It can protect individual machines from exhausting local storage.

Question 3 

 

Which tool aggregates application and system events in a Windows environment?

Question 3 options:

  Security Information and Event Management
  Windows Event Viewer
  Security, Orchestration, Automation, and Response system
  Syslog
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Network Security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:
9781337569798
Author:
ECKERT
Publisher:
CENGAGE L
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning