Nist 800 92
6 community-sourced questions and answers. Free — no login.
Computer Security Log Management
The process of generating, transmitting, storing, analyzing, and disposing of computer security log data.
System Event
Operational actions performed by OS components, such as shutting down the system or staring a service.
Audit Record
Contains security event information such as successful and failed authentication attempts, file accesses, security policy changes account changes, and use of privilege.
Log Management Infrastructure Tier 1
Log Generation, contains the hosts that generate log data.
Log Management Infrastructure Tier 2
Log Analysis and Storage, composed of one or more log servers that receive log data.
Log Management Infrastructure Tier 3
Log Monitoring, contains consoles that may be used to monitor and review data and the results of automated analysis
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials