d.
Assessing the effectiveness of reducing security incidents147. Which of the following security control techniques assists system administrators in protecting physical access of computer systems by intruders?
a.
Access control listsb.
Host-based authenticationc.
Centralized security administrationd.
Keystroke monitoringAccess control lists refer to a register of users who have been given permission to use a particular system resource and the types of access they have been permitted. Host-based authentication grants access based upon the identity of the host originating the request, instead of the identity of the user making the request. Centralized security administration allows control over information because the ability to make changes resides with few individuals, as opposed to many in a decentralized environment. The other three choices do not protect computer systems from intruders, as does the keystroke monitoring.
148. Which of the following is
a.
System auditsb.
System changesc.
Policies and proceduresd.
System monitoringTo maintain operational assurance, organizations use three basic methods: system audits, policies and procedures, and system monitoring. A system audit is a one-time or periodic event to evaluate security. Monitoring refers to an ongoing activity that examines either the system or the users. In general, the more real time an activity is, the more it falls into the category of monitoring. Policies and procedures are the backbone for both auditing and monitoring.
System changes drive new requirements for changes. In response to various events such as user complaints, availability of new features and services, or the discovery of new threats and vulnerabilities, system managers and users modify the system and incorporate new features, new procedures, and software updates. System changes by themselves do not assure that controls are working properly.
149. What is an example of a security policy that can be legally monitored?
a.
Keystroke monitoringb.
Electronic mail monitoringc.
Web browser monitoringd.
Password monitoring150. What is a common security problem?
a.
Discarded storage mediab.
Telephone wiretappingc.
Intelligence consultantsd.
Electronic bugs151. When controlling access to information, an audit log provides which of the following?
a.
Review of security policyb.
Marking files for reportingc.
Identification of jobs rund.
Accountability for actions