Exam 23: Security Software
In order to inform the users of their rights and responsibilities while using computers on an institutions network a(n)____ is made available.
B
Capturing packets is also referred to as ____.
B
Describe host-based intrusion detection.
In host-based intrusion detection,every computer (host)on the network is responsible for examining its network traffic and recognizing the signatures of different types of intrusions.These may be denial of service attacks,buffer overflow attacks,and malicious code such as worms and scripts.These problems may be discovered and prevented through the use of a software firewall and an anti-virus application.It may,however,be necessary to verify the integrity of a system,as firewalls and anti-virus programs are not perfect.Sometimes the malicious code gets through because it is new and the signatures for its detection are not yet distributed.One way to help detect that a system is not compromised is to examine critical system files for changes.This may be done by creating a secure hash of a set of files and periodically rehashing the files to look for any changes.
Host-based intrusion detection may be expensive to implement due to having to purchase firewall,anti-virus,or other protective software for every system on the network.It is also a decentralized approach,since the intrusion detection is being performed on individual systems.This may require a significant amount of time for IT personnel to maintain the systems and respond to individual problems.
Match each item with a statement below.
-Uses a list of common passwords to try to crack an unknown password
____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.
Match each item with a statement below.
-The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature
There are only two ways to help prevent a password from being cracked.
A ____ provides the rules and expectations and the consequences of not following the rules.
A(n)____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email,instant message,or some other communication.
Match each item with a statement below.
-Examines network traffic for known attack signatures
A ____ is an alert given when normal,non-malicious traffic happens to match one or more rules for malicious traffic.
The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.
The ____ technique tries all combinations of letters,numbers,and symbols until eventually landing on the correct password.
A list of ports that are in use can be obtained through the ____ utility.
One way around the switch-based limitation is to use a managed switch that allows a ____ to be designated.
Promiscuous mode guarantees that the network adapter will capture all the network traffic on the LAN.
Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
Describe the educational,diagnostics,network baseline measurements,and security reasons to capture network traffic.
Match each item with a statement below.
-Composed of information commonly known about the individual
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)