Which three statements about the monitoring stage of the Security Wheel are true?

Which three statements about the monitoring stage of the Security Wheel are true? (Choose three)

Which three statements about the monitoring stage of the Security Wheel are true? (Choose three)

A.
It detects violations to the security policy.

B.
New security policies are created during this stage.

C.
It involved system auditing and real-time intrusion detection.

D.
It involves the use of security assessments and vulnerability scanning.

E.
Adjustments are made to the security policy as security vulnerabilities and risks are identified.

F.
It validates the security implementation in step 1.

Explanation:

Detecting violations in your security policy involves monitoring hosts and network traffic to determine when violations occur. Manual monitoring is usually accomplished by utilizing the audit logging capabilities provided by the host operating system. Automatic monitoring involves watching network traffic to determine whether unauthorized activities are occurring on the network. This level of monitoring can be accomplished through the use of Cisco Secure IDS.
Reference: Cisco Secure Intrusion Detection System (Ciscopress) Page 42 Reference: Cisco Courseware page 2-9



Leave a Reply 0

Your email address will not be published. Required fields are marked *