Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

____________________ is a systematic survey of all of the target organization's Internet addresses.

(Short Answer)
4.8/5
(35)

Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.

(True/False)
4.9/5
(34)

A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.

(True/False)
4.7/5
(30)

The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.

(True/False)
4.9/5
(30)

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

(True/False)
4.9/5
(36)

A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

(Multiple Choice)
4.7/5
(46)

Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.

(True/False)
4.8/5
(38)

A(n) ____________________ is a honeypot that has been protected so that it cannot be easily compromised.

(Short Answer)
4.8/5
(30)

The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________

(True/False)
4.8/5
(39)

Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.

(True/False)
4.8/5
(40)

An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDS.

(Essay)
4.9/5
(42)

A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________

(True/False)
4.9/5
(35)

In ____________________ protocol verification, the higher-order protocols are examined for unexpected packet behavior or improper use.

(Short Answer)
4.7/5
(42)

When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________

(True/False)
4.7/5
(32)

____________________ scanning will allow an Nmap user to bounce a scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.

(Short Answer)
4.8/5
(48)

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

(Multiple Choice)
4.9/5
(27)

A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

(Short Answer)
4.7/5
(36)

Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.

(Multiple Choice)
4.8/5
(44)

A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________

(True/False)
5.0/5
(45)

Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.

(Multiple Choice)
5.0/5
(37)
Showing 61 - 80 of 121
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)