Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.
(Multiple Choice)
5.0/5
(32)
In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.
(True/False)
4.8/5
(39)
A(n) ____________________ IDPS can adapt its reactions in response to administrator guidance over time and circumstances of the current local environment.
(Short Answer)
4.9/5
(38)
In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________
(True/False)
4.9/5
(33)
A(n) ____________________ system contains pseudo-services that emulate well-known services, but is configured in ways that make it look vulnerable to attacks.
(Short Answer)
4.7/5
(33)
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________
(True/False)
4.9/5
(36)
Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker's system to find out as much as possible about the hacker.
(Short Answer)
4.9/5
(38)
Three methods dominate IDPS detection methods: the ____________________-based approach, the statistical anomaly-based approach, and the stateful packet inspection approach.
(Short Answer)
4.9/5
(44)
To act as quality control for security design and administration, especially of large and complex enterprises
(Short Answer)
4.8/5
(41)
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
(True/False)
4.9/5
(42)
The attack ____________________ is a series of steps or processes used by an attacker, in a logical sequence, to launch an attack against a target system or network.
(Short Answer)
4.9/5
(38)
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
(True/False)
4.9/5
(46)
NIDPSs are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.
(Essay)
4.7/5
(34)
List and describe the three advantages of NIDPSs.
(Not Answered)
This question doesn't have any answer yet
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
(Multiple Choice)
4.9/5
(31)
With a(n) ____________________ IDPS control strategy, all IDPS control functions are implemented and managed in a central location.
(Short Answer)
4.7/5
(31)
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.
(True/False)
4.9/5
(45)
Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.
(True/False)
4.8/5
(33)
Showing 81 - 100 of 121
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)