168. A fault-tolerant design feature for large distributed systems considers all the following
a.
Using multiple components to duplicate functionalityb.
Using duplicated systems in separate locationsc.
Using modular componentsd.
Providing backup power supplies169. The process of degaussing involves which of the following?
a.
Retrieving all stored informationb.
Storing all recorded informationc.
Removing all recorded informationd.
Archiving all recorded information170. An audit trail record should include sufficient information to trace a user’s actions and events. Which of the following information in the audit trail record helps the most to determine if the user was a masquerader or the actual person specified?
a.
The user identification associated with the eventb.
The date and time associated with the eventc.
The program used to initiate the eventd.
The command used to initiate the eventThe other three choices are incorrect because the masquerader could be using a fake user identification (ID) number or calling for invalid and inappropriate programs and commands.
In general, an event record should specify when the event occurred, the user ID associated with the event, the program or command used to initiate the event, and the result.
171. Automated tools help in analyzing audit trail data. Which one of the following tools looks for anomalies in user or system behavior?
a.
Trend analysis toolsb.
Audit data reduction toolsc.
Attack signature detection toolsd.
Audit data-collection toolsAudit data reduction tools are preprocessors designed to reduce the volume of audit records to facilitate manual review. These tools generally remove records generated by specified classes of events, such as records generated by nightly backups.
Attack signature detection tools look for an attack signature, which is a specific sequence of events indicative of an unauthorized access attempt. A simple example is repeated failed log-in attempts. Audit data-collection tools simply gather data for analysis later.
172. Regarding a patch management program, which of the following helps system administrators
1.
Supported equipment2.
Supported applications software3.
Unsupported hardware4.
Unsupported operating systemsa.
1 onlyb.
2 onlyc.
1 and 2d.
3 and 4