Exam 12: Security Through Monitoring and Auditing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of intrusion detection focuses on monitoring network traffic associated with a specific network segment?

(Multiple Choice)
4.9/5
(33)

In the event log, what type of event is indicated with a white "x" that appears inside a red circle?

(Multiple Choice)
4.9/5
(40)

List four third-party active intrusion-detection tools.

(Essay)
4.8/5
(35)

Which active intrusion-detection tool is a distributed system that works on servers and clients and denies application requests that are not permitted, on the basis of a security policy applying to the servers and clients?

(Multiple Choice)
4.9/5
(41)

Which event log records events that are associated with Active Directory?

(Multiple Choice)
4.7/5
(35)

Can Network Monitor filter frames and packets on the basis of SAP or ETYPE?

(True/False)
4.7/5
(46)

List five third-party passive intrusion-detection tools.

(Essay)
4.9/5
(38)

Active intrusion detection is effective as long as the server or network administrator regularly checks the logs and recorded information for possible intrusion attempts.

(True/False)
4.9/5
(35)

  If a network administrator wants to use host-based intrusion detection, which devices in the figure above would need to be configured? If a network administrator wants to use host-based intrusion detection, which devices in the figure above would need to be configured?

(Multiple Choice)
4.8/5
(39)

What two purposes does a honeypot serve for an organization?

(Essay)
4.9/5
(48)

Network Monitor is a utility which comes with Windows 2000 Server and Windows Server 2003.

(True/False)
4.9/5
(42)

The default folder for saved Network Monitor capture information in Windows Server 2003 is \WINNT\system32\NETMON\CAPTURES .

(True/False)
4.9/5
(32)

Network-based intrusion-detection software is categorized as host wrappers or host-based agents.

(True/False)
4.9/5
(29)

A(n) ____________________ can be acquired by using performance monitoring to establish slow, average, and peak periods for a network, and keeping records on these periods.

(Short Answer)
4.8/5
(42)

At minimum, ____________________ intrusion detection alerts a server or network administrator about an attack or intrusion, so the administrator can take action.

(Short Answer)
4.9/5
(40)

Can the version of Network Monitor that comes with Windows Server 2003 capture and read the contents of any frames transported on the network segment to which the host computer is connected?

(True/False)
4.8/5
(37)

In Netware, in which directory are the Access log and the Error log kept?

(Multiple Choice)
5.0/5
(39)

Which passive intrusion-detection tool monitors network activity and includes a proprietary programming language to customize the way it captures and analyzes information?

(Multiple Choice)
4.8/5
(30)

Are the Mac OS X logs located in the /var/log directory?

(True/False)
4.8/5
(39)

Is the System Log in Mac OS X contained in the file messages.x?

(True/False)
4.8/5
(40)
Showing 61 - 80 of 86
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)