Which of the following signs is an indicator of a security incident on a Linux-based Azure platform?

Prepare for the Certified Incident Handler (CIH) Exam. Enhance your knowledge with interactive quizzes and detailed insights into cyber incident handling. Boost your exam readiness with our expert-designed questions!

Disabling "auditd" logging is a strong indicator of a security incident on a Linux-based Azure platform because auditd provides crucial logging capabilities that track system events, user activity, and potential security breaches. When audit logging is disabled, it can suggest that someone is trying to hide their tracks or is attempting to compromise the system without leaving a trace. This action significantly reduces the visibility and monitoring capability for suspicious activities, making it a red flag for potential security incidents.

In contrast, implementing regular updates, ensuring firewalls are active, and using standard user accounts are all best practices in system security management. Regular updates help patch vulnerabilities, active firewalls prevent unauthorized access, and using standard user accounts minimizes the risk associated with administrative privileges. Therefore, these practices do not indicate a security incident, while disabling audit logging directly raises concerns about the integrity and security of the environment.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy