O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exercises

In the following exercises, you apply what you’ve learned in this chapter. The answers for these exercises are located in the Answers section at the end of this chapter.

Exercise 2-1

Locate the logs on your computer that show successful and failed authentication. On a Windows system, they can be found by right-clicking My Computer and selecting Manage. Then, in the computer Management dialog box, expand the Event Viewer in the left column. Expand Windows Logs and select Security. On a Ubuntu Linux system (and many other Linux distributions), the authentication logs can be found in /var/log/auth.log.

Locate any failed logon attempts.

Document how you would configure the maximum size of a log file and what the system will do when that maximum ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required