Challenge - 5 Problems
Logging and Audit Trails Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
💻 Command Output
intermediate2:00remaining
Output of syslog command filtering
What is the output of the following command on a Linux system with syslog configured?
Assume the last three ERROR entries in syslog are:
1. "ERROR: Disk quota exceeded"
2. "ERROR: Failed to start service"
3. "ERROR: Network unreachable"
sudo grep "ERROR" /var/log/syslog | tail -n 3Assume the last three ERROR entries in syslog are:
1. "ERROR: Disk quota exceeded"
2. "ERROR: Failed to start service"
3. "ERROR: Network unreachable"
Cybersecurity
sudo grep "ERROR" /var/log/syslog | tail -n 3
Attempts:
2 left
💡 Hint
The tail command shows the last lines in the order they appear.
✗ Incorrect
The grep command filters lines containing 'ERROR' in syslog. Tail -n 3 shows the last three lines in the original order, so the output matches the last three ERROR entries as listed.
🧠 Conceptual
intermediate1:30remaining
Purpose of audit trails in security
Which of the following best describes the primary purpose of audit trails in cybersecurity?
Attempts:
2 left
💡 Hint
Think about what audit trails help you do after an event happens.
✗ Incorrect
Audit trails provide a record of user and system actions. This helps in tracking what happened, who did it, and when, which is essential for accountability and forensic investigations.
❓ Troubleshoot
advanced2:30remaining
Troubleshooting missing log entries
A system administrator notices that some critical security events are missing from the audit log file. Which of the following is the most likely cause?
Attempts:
2 left
💡 Hint
Consider what controls which events get logged.
✗ Incorrect
Audit daemons use configuration files to specify which events to log. If critical events are missing, it is likely those event types are not included in the configuration.
🔀 Workflow
advanced3:00remaining
Steps to secure audit logs
Which sequence of steps correctly describes how to secure audit logs to prevent tampering?
Attempts:
2 left
💡 Hint
Think about setting up, protecting, forwarding, then verifying logs.
✗ Incorrect
First configure where logs are stored, then restrict access, forward logs to a secure remote server to prevent local tampering, and finally verify integrity regularly.
✅ Best Practice
expert2:30remaining
Best practice for log retention policy
What is the best practice for defining a log retention policy in a secure environment?
Attempts:
2 left
💡 Hint
Balance between compliance needs and storage management.
✗ Incorrect
Logs should be kept long enough to satisfy legal, compliance, and forensic needs, then securely deleted to reduce risk and save resources.