Question


a. active defense in depth f. operational audit
b. centralized data collection g. security event management program
c. degaussing h. social engineering
d. distributed data collection i. target-to-console ratio
e. independent audit j. Tinkerbell program
1/ an audit in which an outside firm inspects audit logs to ensure that an organization is collecting the information it needs
2/ a strong implementation of the DiD concept in which security personnel expect that attacks will occur and try to anticipate them
3/ a technique of tricking employees into divulging passwords or other information
4/ the process of magnetically erasing an electronic device, such as a monitor or a disk
5/ the number of target computers on a network managed by a single command console
6/ an audit by an organization's own staff that examines system and security logs
7/ a system in which an organization's event and security data is funneled to a management console in the main office
8/ a program in which network connections are scanned and alerts are generated when logons are attempted from a suspicious IDPS
9/ a program that gathers and consolidates events from multiple sources so that the information can be analyzed to improve network security
10/ a system in which data from security devices goes to a management console on its own local network

Answer

This answer is hidden. It contains 32 characters.