Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
A ____ resides on a computer or appliance connected to a segment of an organization's network and monitors network traffic on that network segment - much like tcpdump - looking for indications of ongoing or successful attacks.
(Multiple Choice)
4.9/5
(33)
Wireless sensors are most effective when their ____ overlap.
(Multiple Choice)
4.8/5
(33)
____________________ sensors are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
(Short Answer)
4.8/5
(31)
According to SP 800-94, ____________________ (SPA) is a process of comparing predetermined profiles of generally accepted definitions of benign activity for each protocol state against observed events to identify deviations.
(Short Answer)
4.8/5
(34)
One tool that provides active intrusion prevention is known as ____.
(Multiple Choice)
4.9/5
(30)
Match each item with a statement below.
a.Alert
f.False positive
b.Confidence
g.Filtering
c.Evasion
h.Tuning
d.Events
i.Thresholds
e.False negative
-An indication that a system has detected a possible attack.
(Short Answer)
4.7/5
(39)
Match each item with a statement below.
a.Alert
f.False positive
b.Confidence
g.Filtering
c.Evasion
h.Tuning
d.Events
i.Thresholds
e.False negative
-A value placed on an IDPS event's ability to correctly detect and identify certain types of attacks.
(Short Answer)
4.9/5
(40)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)