in Education by
IT security department must periodically check for security logs and entries made during office hours. (a) True (b) False I have been asked this question in a job interview. I'd like to ask this question from Social Engineering and Physical Hacking in section Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct answer is (a) True Best explanation: Checking for security logs and entries made by employees and other outsiders who entered the office can help in identifying whether any suspicious person is getting in and out of the building or not.

Related questions

0 votes
    A ______________ is essentially a text file residing on the server that hosts different domain containing entries ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ______________ tool clears the log entries in the IIS log files filtered by an IP address. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Activate _____________ when you're required it to use, otherwise turn it off for security purpose. (a) ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    As you sense your device has been infected with spyware, you should run a scan with your existing security ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ____________ logs all the visits in log files which is located at \logfiles. (a) IIS (b) Microsoft Server ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Using 3-way handshake, it is possible to check for open ports. (a) True (b) False This question was ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _________ are those individuals who maintain and handles IT security in any firm or organization. (a) IT Security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    For hacking a database or accessing and manipulating data which of the following language the hacker must know? (a) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...