Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ resides on a computer or appliance connected to a segment of an organization's network and monitors network traffic on that network segment - much like tcpdump - looking for indications of ongoing or successful attacks.

(Multiple Choice)
4.9/5
(33)

Wireless sensors are most effective when their ____ overlap.

(Multiple Choice)
4.8/5
(33)

____________________ sensors are typically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

(Short Answer)
4.8/5
(31)

According to SP 800-94, ____________________ (SPA) is a process of comparing predetermined profiles of generally accepted definitions of benign activity for each protocol state against observed events to identify deviations.

(Short Answer)
4.8/5
(34)

One tool that provides active intrusion prevention is known as ____.

(Multiple Choice)
4.9/5
(30)

List five strengths of IDPSs.

(Essay)
4.8/5
(35)

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -An indication that a system has detected a possible attack.

(Short Answer)
4.7/5
(39)

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -A value placed on an IDPS event's ability to correctly detect and identify certain types of attacks.

(Short Answer)
4.9/5
(40)

Describe the response behavior of IDPSs.

(Essay)
4.8/5
(40)

Define and describe a fully distributed IDPS control strategy.

(Essay)
4.8/5
(30)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)