Exam 5: Intrusion-Detection Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________ is a method of providing free software for distribution with the code available for viewing and altering.

(Short Answer)
4.9/5
(46)

What might one see in an implementation of intrusion deterrence?

(Multiple Choice)
4.8/5
(40)

One type of intrusion-detection and avoidance which involves identifying suspect IP addresses and preventing intrusions is called:

(Multiple Choice)
4.8/5
(28)

Attempts by an intruder to determine information about a system prior to the start of an intrusion attack is called:

(Multiple Choice)
4.8/5
(35)

In which mode of operation does Snort display a continuous stream of packet contents to the console?

(Multiple Choice)
4.9/5
(42)

Which intrusion-detection method measures activity levels against known short-term and\or long-term work profiles?

(Multiple Choice)
4.9/5
(47)
Showing 21 - 26 of 26
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)