Exam 5: Intrusion-Detection Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The system administrator can be alerted by a(n)____________ to attempts to breach a system.

Free
(Short Answer)
5.0/5
(34)
Correct Answer:
Verified

IDS

Banishment vigilance is another name for:

Free
(Multiple Choice)
4.8/5
(39)
Correct Answer:
Verified

D

Implementation of intrusion deflection as a strategy requires the use of:

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

B

Which is NOT one of the basic premises under which a honey pot functions?

(Multiple Choice)
4.9/5
(34)

Which method of intrusion-detection develops historic usage levels to measure activity against?

(Multiple Choice)
4.8/5
(27)

Machines set up as apparent targets used to allow attackers access into a network so they can be monitored are called ____________.

(Short Answer)
4.8/5
(37)

In ____________ the system uses software and a variety of techniques to identify behaviors that appear inappropriate and compare them with acceptable behaviors.

(Short Answer)
4.8/5
(47)

Symantec's Decoy Server is a software IDS solution known as a(n)____________.

(Short Answer)
4.9/5
(31)

One of the most well-known free software-based intrusion-detection systems available to monitor incoming traffic is ____________.

(Short Answer)
4.9/5
(36)

Which intrusion detection strategy monitors and compares activity against preset acceptable levels?

(Multiple Choice)
4.7/5
(35)

An intrusion-detection system detecting a series of ICMP packets sent to each port from the same IP address might indicate:

(Multiple Choice)
4.8/5
(32)

Following rules and learning from experience as part of the process to identify and notify an administrator about an intrusion are typical when Snort is operating in which mode?

(Multiple Choice)
4.9/5
(31)

Which is NOT a function of an intrusion-detection system?

(Multiple Choice)
4.9/5
(35)

Which type of intrusion-detection relies on people rather than software or hardware?

(Multiple Choice)
4.9/5
(36)

Symantec Decoy Server does all of the following EXCEPT:

(Multiple Choice)
4.7/5
(33)

An intrusion-detection method that measures and monitors how programs use system resources is called:

(Multiple Choice)
4.9/5
(34)

____________ is the process an intruder uses to gain as much information as possible about a target system in the early stages of attack preparation.

(Short Answer)
4.9/5
(39)

Which strategy is used in the implementation of intrusion deterrence?

(Multiple Choice)
4.9/5
(34)

Doing one's own detective work such as trying to gather information about potential threats from illicit sources like hacker groups is known as ____________.

(Short Answer)
4.8/5
(28)

Banishment vigilance is another name for ____________.

(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)