Search Header Logo

Comptia Security+ Understanding Monitoring and Auditing

Authored by J. Hines

Computers

Professional Development

Used 12+ times

Comptia Security+ Understanding Monitoring and Auditing
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security analyst is reviewing a log file that shows multiple failed login attempts to a server within a short period of time. Which monitoring technique would be most effective in identifying the source of these attempts?

Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Security Information and Event Management (SIEM)
Network Traffic Analyzer
Packet Capture and Analysis

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is commonly used to detect unauthorized changes to critical system files?

Data loss prevention
File integrity monitoring
Port scanning
Network intrusion detection
Vulnerability scanning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key characteristic of a continuous monitoring strategy?

Periodic review of audit logs
Retention of log files for 1 year
Manual review of incidents
Real-time monitoring
Conducting periodic assessments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator is configuring a SIEM solution to monitor the network for possible security incidents. Which of the following should be the primary focus when defining correlation rules for the SIEM solution?

Incident response procedures
Network traffic analysis
Network architecture diagrams
Regulatory compliance requirements
Security policies and procedures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an auditing technique that focuses on the identification of vulnerabilities in a system by simulating an attack?

Vulnerability scanning
Port scanning
Penetration testing
Log file analysis
Security Information and Event Management (SIEM)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an activity that can be monitored using a Network Intrusion Detection System (NIDS)?

Application performance issues
System downtime incidents
Failed login attempts
Unauthorized access attempts
Firewall rule changes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator wants to monitor suspicious network traffic and detect any potentially malicious activities. Which of the following tools would be the most appropriate for this purpose?

Security Information and Event Management (SIEM)
Digital certificate authority
Firewall logs analysis
Intrusion Detection System (IDS)
Penetration testing tool

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?