Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security84 Questions
Exam 4: Planning for Security110 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and Vpns117 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools121 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
(True/False)
4.8/5
(48)
Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.
(Multiple Choice)
4.8/5
(37)
An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
(True/False)
4.8/5
(41)
A padded cell is a hardened honeynet. _________________________
(True/False)
4.8/5
(32)
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________
(True/False)
5.0/5
(40)
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
(True/False)
4.8/5
(39)
To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system
(Short Answer)
4.8/5
(47)
The ____________________ port is also known as a switched port analysis (SPAN) port or mirror port.
(Short Answer)
4.8/5
(44)
A false positive is the failure of an IDPS system to react to an actual attack event.
(True/False)
4.9/5
(45)
An HIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.
(Short Answer)
4.8/5
(27)
A ____________________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.
(Short Answer)
4.9/5
(46)
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
(True/False)
5.0/5
(39)
A fully distributed IDPS control strategy is an IDPS implementation approach in which all control
functions are applied at the physical location of each IDPS component.
(True/False)
4.8/5
(44)
NIDPSs are not usually susceptible to direct attack and may not be detectable by attackers.
(Essay)
4.8/5
(39)
HIDPSs are also known as system ____________________ verifiers.
(Short Answer)
4.7/5
(41)
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________
(True/False)
4.9/5
(31)
__________ are decoy systems designed to lure potential attackers away from critical systems.
(Multiple Choice)
4.9/5
(46)
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
(True/False)
4.9/5
(49)
A(n) __________ IDPS is focused on protecting network information assets.
(Multiple Choice)
4.8/5
(41)
Showing 101 - 120 of 121
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)