O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Answers

This section contains the exercises and the Chapter review section in this chapter.

Exercise 2-1

In Windows, the maximum size of a log is defined by right-clicking the log and selecting Properties. Then adjust the size in the Maximum Log Size field. Control what the system should do when the log size has been reached just below that by selecting Overwrite Events As Needed (called circular logging; overwrites and loses events), Archive The Log (saves the events in the full log as a separate file and will not lose events), or Do Not Overwrite Events (log must be cleared manually; log stops accepting new events and could lose event when full). See Figure 2-15.

Figure 2-15. Configuration of the security event logs (Windows)

In Ubuntu Linux, the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required