OS Security
What are the drawbacks of the host based IDS?
Unselective logging of messages may increase the audit burdens
Selective logging runs the risk of missed attacks
They are very fast to detect
They have to be programmed for new patterns
Unselective logging of messages may increase the audit burdens
Related posts
What are the characteristics of Host based IDS?A. The host operating system logs in the audit information
B. Logs includes logins,file opens and program executions
C. Logs are analysed to detect tails of intrusion
D. All of the mentioned
Which one of the following is not a secondary storage?
A. Magnetic disks
B. Magnetic tapes
C. RAM
D. None of the mentioned
What is the breach of integrity?
A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
What are the two features of a tripwire file system?
A. It is a tool to monitor file systems
B. It is used to automatically take corrective action
C. It is used to secure UNIX system
D. None of the mentioned
A swap space can reside in ___________
A. Separate disk partition
B. RAM
C. Cache
D. None of the mentioned
The time for the disk arm to move the heads to the cylinder containing the desired sector is called ___________
A. disk time
B. seek time
C. arm time
D. sector time
What is used to protect network from outside internet access?
A. A trusted antivirus
B. 24 hours scanning for virus
C. Firewall to separate trusted and untrusted network
D. Deny users access to websites which can potentially cause security leak
Leave a Reply