Which of the following types of activities can be audited for security?

Which of the following types of activities can be audited for security?
Each correct answer represents a complete solution. Choose three.

Which of the following types of activities can be audited for security?
Each correct answer represents a complete solution. Choose three.

A.
Data downloading from the Internet

B.
File and object access

C.
Network logons and logoffs

D.
Printer access

Explanation:
The following types of activities can be auditeD.

Network logons and logoffs
File access
Printer access
Remote access service
Application usage
Network services
Auditing is used to track user accounts for file and object access, logon attempts, system shutdown,
etc. This enhances the security of the network. Before enabling security auditing, the type of event
to be audited should be specified in the audit policy.
Auditing is an essential component to maintain the security of deployed systems. Security auditing
depends on the criticality of the environment and on the company’s security policy. The security
system should be reviewed periodically.
Answer option A is incorrect. Data downloading from the Internet cannot be audited.



Leave a Reply 0

Your email address will not be published. Required fields are marked *