Authorization Flashcards

1
Q

Accounting

A

Security measure that ensures all user activities during a communication or transaction are properly tracked and recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Create an audit trail

A

Provides a chronological record of all user activities that can be used to trace changes, unauthorized access, or anomalies back to a source or point in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintain regulatory compliance

A

Maintains a comprehensive record of all user’s activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Forensic analysises

A

Using detailed accounting and event logs that can help cybersecurity experts understand what happened, how it happened, and how to prevent similar incidents from occurring again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Resource optimization

A

Organizations can optimize system performance and minimize costs by tracking resource utilization and allocation decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Achieve user accountability

A

Thorough accounting systems ensure user’s actions are monitored and logged, deterring potential misuse and promoting adherence to the organization’s policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Syslog Servers

A

Used to aggregate logs from various network devices and systems so that system administrators can analyze them to detect patterns or anomalies in the organization’s systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Analysis Tools

A

Used to capture and analyze network traffic so that network administrators can gain detailed insights into all the data moving within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM

A

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are SIEM’s?

A

Provides us with a real-time analysis of security alerts generated by various hardware and software infrastructure in an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly