1. You
have been asked to developed and audit plan for your company . you have been told that there have been costant
deletions of files that are being worked
on by team , and that they have had to redo the work a number of times .
what type of auditing would you implement to track the access to this resource
a. Logon/logoff
success
b. Object/file
access success
c. Object/file
access failure
d. Logon/logoff
failure
2. Which of the following are a benefit of
removing unused or unneeded service and
protocols?
a. More
machine resource availability
b. More
network throughtput
c. Less
need for administration
d. More
security
3. Which
is the most important reason for the removal
of unused , unnecessary, or unneeded protocols, service, and application
?
a. Increased
security
b. Increased
performance
c. Less
need administration
d. Less
machine resource use