Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
__________ is the action of luring an individual into committing a crime to get a conviction.
(Multiple Choice)
4.8/5
(38)
A(n) event is an indication that a system has just been attacked or is under attack. _________________________
(True/False)
4.9/5
(36)
Intrusion detection and prevention systems can deal effectively with switched networks.
(True/False)
4.8/5
(36)
When the measured activity is outside the baseline parameters, it is said to exceed the ____________________ level.
(Short Answer)
4.9/5
(39)
Which of the following is NOT a described IDPS control strategy?
(Multiple Choice)
4.9/5
(42)
All IDPS vendors target users with the same levels of technical and security expertise.
(True/False)
4.9/5
(27)
A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________
(True/False)
4.9/5
(37)
A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.
(Multiple Choice)
4.7/5
(30)
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
(True/False)
4.7/5
(40)
List and describe the four advantages of HIDPSs.
(Not Answered)
This question doesn't have any answer yet
An HIDPS can detect inconsistencies in how applications and systems programs were used by examining the records stored in audit logs. This can enable it to detect some types of attacks, including Trojan horse programs.
(Short Answer)
4.9/5
(34)
The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________
(True/False)
4.9/5
(29)
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) ____________________.
(Short Answer)
4.9/5
(30)
____________________ is the process of attracting attention to a system by placing tantalizing bits of information in key locations.
(Short Answer)
4.8/5
(43)
Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________
(True/False)
4.9/5
(50)
__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.
(Multiple Choice)
5.0/5
(46)
For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________
(True/False)
4.9/5
(41)
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
(True/False)
4.9/5
(41)
Showing 21 - 40 of 121
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)