Accounting Flashcards

1
Q

What are security measures that ensure all user activities are properly tracked and recorded?

A

Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 things does accounting achieve?

A

Transparency, security, accountability (TSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 5 things does accounting ensures and provide?

A

Audit trails, regulatory compliance, forensic analysis, resources optimization, user accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provides chronological record of all user activities that can be used to traces changes, unauthorized access, or anomalies back to a specific user or point in time?

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What maintains a record of all users activities?

A

Activity Log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What uses detailed accounting and event logs that help cybersecurity experts understand what happened, how it happened, and how to prevent an incident from occurring again?

A

Forensic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organizations can optimize system performance and minimize costs by tracking resources utilization and allocation decisions. What do we call this?

A

Resource Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

User actions are logged, deterring potential misuse and promoting adherence to the organization’s policies. This is called:

A

User Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What systems are used for accounting?

A

Syslog servers, network analysis tools, and SIEMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are aggregate logs from various network devices and systems? Admin’s can analyze logs to detect patterns or anomalies in an org’s system.

A

Syslog Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is used to capture and analyze network traffic to gain detailed insights into all the data moving within a network?

A

Network analysis tools (Wireshark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a system that provides real-time analysis of security alerts generated by various hardware and software infrastructure in an organization?

A

SIEM (Security Information and Event Management) Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly