Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
____________________ is a systematic survey of all of the target organization's Internet addresses.
(Short Answer)
4.8/5
(35)
Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.
(True/False)
4.9/5
(34)
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
(True/False)
4.7/5
(30)
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
(True/False)
4.9/5
(30)
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
(True/False)
4.9/5
(36)
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.
(Multiple Choice)
4.7/5
(46)
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
(True/False)
4.8/5
(38)
A(n) ____________________ is a honeypot that has been protected so that it cannot be easily compromised.
(Short Answer)
4.8/5
(30)
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________
(True/False)
4.8/5
(39)
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
(True/False)
4.8/5
(40)
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDS.
(Essay)
4.9/5
(42)
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
(True/False)
4.9/5
(35)
In ____________________ protocol verification, the higher-order protocols are examined for unexpected packet behavior or improper use.
(Short Answer)
4.7/5
(42)
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
(True/False)
4.7/5
(32)
____________________ scanning will allow an Nmap user to bounce a scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.
(Short Answer)
4.8/5
(48)
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
(Multiple Choice)
4.9/5
(27)
A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
(Short Answer)
4.7/5
(36)
Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.
(Multiple Choice)
4.8/5
(44)
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________
(True/False)
5.0/5
(45)
Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.
(Multiple Choice)
5.0/5
(37)
Showing 61 - 80 of 121
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)