Exam 23: Security Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n)____ is made available.

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

B

Capturing packets is also referred to as ____.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

Describe host-based intrusion detection.

Free
(Essay)
4.8/5
(32)
Correct Answer:
Verified

In host-based intrusion detection,every computer (host)on the network is responsible for examining its network traffic and recognizing the signatures of different types of intrusions.These may be denial of service attacks,buffer overflow attacks,and malicious code such as worms and scripts.These problems may be discovered and prevented through the use of a software firewall and an anti-virus application.It may,however,be necessary to verify the integrity of a system,as firewalls and anti-virus programs are not perfect.Sometimes the malicious code gets through because it is new and the signatures for its detection are not yet distributed.One way to help detect that a system is not compromised is to examine critical system files for changes.This may be done by creating a secure hash of a set of files and periodically rehashing the files to look for any changes.
Host-based intrusion detection may be expensive to implement due to having to purchase firewall,anti-virus,or other protective software for every system on the network.It is also a decentralized approach,since the intrusion detection is being performed on individual systems.This may require a significant amount of time for IT personnel to maintain the systems and respond to individual problems.

Match each item with a statement below. -Uses a list of common passwords to try to crack an unknown password

(Multiple Choice)
4.8/5
(30)

____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.

(Multiple Choice)
4.9/5
(38)

Match each item with a statement below. -The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature

(Multiple Choice)
4.9/5
(39)

There are only two ways to help prevent a password from being cracked.

(True/False)
4.7/5
(40)

A ____ provides the rules and expectations and the consequences of not following the rules.

(Multiple Choice)
4.7/5
(30)

A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.

(Short Answer)
4.9/5
(46)

Match each item with a statement below. -Examines network traffic for known attack signatures

(Multiple Choice)
4.8/5
(24)

A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.

(Multiple Choice)
5.0/5
(37)

The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.

(Short Answer)
4.9/5
(40)

The ____ technique tries all combinations of letters,numbers,and symbols until eventually landing on the correct password.

(Multiple Choice)
4.8/5
(26)

Security policies and procedures should be static.

(True/False)
4.9/5
(36)

A list of ports that are in use can be obtained through the ____ utility.

(Multiple Choice)
4.7/5
(36)

One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.

(Multiple Choice)
4.8/5
(37)

Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.

(True/False)
4.7/5
(29)

Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.

(Short Answer)
4.7/5
(29)

Describe the educational,diagnostics,network baseline measurements,and security reasons to capture network traffic.

(Essay)
4.9/5
(33)

Match each item with a statement below. -Composed of information commonly known about the individual

(Multiple Choice)
4.8/5
(43)
Showing 1 - 20 of 30
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)