Exam 5: Intrusion-Detection Systems
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
The system administrator can be alerted by a(n)____________ to attempts to breach a system.
Free
(Short Answer)
5.0/5
(34)
Correct Answer:
IDS
Banishment vigilance is another name for:
Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
D
Implementation of intrusion deflection as a strategy requires the use of:
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
B
Which is NOT one of the basic premises under which a honey pot functions?
(Multiple Choice)
4.9/5
(34)
Which method of intrusion-detection develops historic usage levels to measure activity against?
(Multiple Choice)
4.8/5
(27)
Machines set up as apparent targets used to allow attackers access into a network so they can be monitored are called ____________.
(Short Answer)
4.8/5
(37)
In ____________ the system uses software and a variety of techniques to identify behaviors that appear inappropriate and compare them with acceptable behaviors.
(Short Answer)
4.8/5
(47)
Symantec's Decoy Server is a software IDS solution known as a(n)____________.
(Short Answer)
4.9/5
(31)
One of the most well-known free software-based intrusion-detection systems available to monitor incoming traffic is ____________.
(Short Answer)
4.9/5
(36)
Which intrusion detection strategy monitors and compares activity against preset acceptable levels?
(Multiple Choice)
4.7/5
(35)
An intrusion-detection system detecting a series of ICMP packets sent to each port from the same IP address might indicate:
(Multiple Choice)
4.8/5
(32)
Following rules and learning from experience as part of the process to identify and notify an administrator about an intrusion are typical when Snort is operating in which mode?
(Multiple Choice)
4.9/5
(31)
Which type of intrusion-detection relies on people rather than software or hardware?
(Multiple Choice)
4.9/5
(36)
An intrusion-detection method that measures and monitors how programs use system resources is called:
(Multiple Choice)
4.9/5
(34)
____________ is the process an intruder uses to gain as much information as possible about a target system in the early stages of attack preparation.
(Short Answer)
4.9/5
(39)
Which strategy is used in the implementation of intrusion deterrence?
(Multiple Choice)
4.9/5
(34)
Doing one's own detective work such as trying to gather information about potential threats from illicit sources like hacker groups is known as ____________.
(Short Answer)
4.8/5
(28)
Showing 1 - 20 of 26
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)