Page 1279 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1279

14.  Which of the following options is a methodical examination or
                    review of an environment to ensure compliance with regulations

                    and to detect abnormalities, unauthorized occurrences, or outright
                    crimes?

                    A.  Penetration testing

                    B.  Auditing

                    C.  Risk analysis

                    D.  Entrapment

               15.  What can be used to reduce the amount of logged or audited data
                    using nonstatistical methods?

                    A.  Clipping levels


                    B.  Sampling

                    C.  Log analysis

                    D.  Alarm triggers

               16.  Which of the following focuses more on the patterns and trends of
                    data than on the actual content?

                    A.  Keystroke monitoring

                    B.  Traffic analysis

                    C.  Event logging

                    D.  Security auditing

               17.  What would detect when a user has more privileges than

                    necessary?

                    A.  Account management

                    B.  User entitlement audit

                    C.  Logging

                    D.  Reporting

                        Refer to the following scenario when answering questions 18
                        through 20.
   1274   1275   1276   1277   1278   1279   1280   1281   1282   1283   1284