Page 1279 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1279
14. Which of the following options is a methodical examination or
review of an environment to ensure compliance with regulations
and to detect abnormalities, unauthorized occurrences, or outright
crimes?
A. Penetration testing
B. Auditing
C. Risk analysis
D. Entrapment
15. What can be used to reduce the amount of logged or audited data
using nonstatistical methods?
A. Clipping levels
B. Sampling
C. Log analysis
D. Alarm triggers
16. Which of the following focuses more on the patterns and trends of
data than on the actual content?
A. Keystroke monitoring
B. Traffic analysis
C. Event logging
D. Security auditing
17. What would detect when a user has more privileges than
necessary?
A. Account management
B. User entitlement audit
C. Logging
D. Reporting
Refer to the following scenario when answering questions 18
through 20.

