studynotesandtheory

Open full view…

Domain 6: Security Assessment and Testing

ntalelukama
Mon, 07 Nov 2016 20:08:19 GMT

​ Yadim Holdings is a trading company that engages in high-speed trading with the major financial markets. Recently, it has been the target of several data breaches on its software. As a result, the Senior Management team asked its Software Development department to describe their Computer security management for their applications. The Software Development staff decided to start by providing a list of Applications deployed in the enterprise and to highlight the generated log entries. What is the log entry the department should not show? A. Client requests and server responses B. Usage Information C. Systems events D. Account information Source: http://www.favored.us/ Domain 6: Security Assessment and Testing

zqasrawi
Wed, 09 Nov 2016 19:29:42 GMT

D. Account information

ntalelukama
Mon, 28 Nov 2016 07:36:43 GMT

H Zqasrawi, According to the CBK in its section Assessment and Test Strategies - Log Reviews - Standard Log Management Operational Processes - page 1178-1180, the most commonly logged types of info generated by applications include: Client requests and server responses, Account information, Usage information, Operational actions. You can also find more information in the Guide to Computer Security Log Management, Security Software: http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pd

param83
Sun, 30 Apr 2017 05:42:38 GMT

Just to add, Audit Records and System events logs are generated by OS.