Answer the following statements true (T) or false (F)

1. Protection of the audit trail involves both integrity and confidentiality.
2. The foundation of a security auditing facility is the initial capture of
the audit data.
3. All UNIX implementations will have the same variants of the syslog
facility.
4. Thresholding is a form of baseline analysis.
5. Applications, especially applications with a certain level of privilege,
present security problems that may not be captured by system-level or user-level auditing data.


1. True
2. True
3. Fa;se
4. Trie
5. True

Computer Science & Information Technology

You might also like to view...

________ are rules added to a database to help ensure the data's validity

Fill in the blank(s) with correct word

Computer Science & Information Technology

In database functions, <>, >, =, <, >= and <= are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology