IT CertificationsAnswer Key

Nist 800 92

6 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Computer Security Log Management

ANSWER

The process of generating, transmitting, storing, analyzing, and disposing of computer security log data.

QUESTION 2

System Event

ANSWER

Operational actions performed by OS components, such as shutting down the system or staring a service.

QUESTION 3

Audit Record

ANSWER

Contains security event information such as successful and failed authentication attempts, file accesses, security policy changes account changes, and use of privilege.

QUESTION 4

Log Management Infrastructure Tier 1

ANSWER

Log Generation, contains the hosts that generate log data.

QUESTION 5

Log Management Infrastructure Tier 2

ANSWER

Log Analysis and Storage, composed of one or more log servers that receive log data.

QUESTION 6

Log Management Infrastructure Tier 3

ANSWER

Log Monitoring, contains consoles that may be used to monitor and review data and the results of automated analysis

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials