Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The attack ____________________ is a series of steps or processes used by an attacker, in a logical sequence, to launch an attack against a target system or network.

Free
(Short Answer)
4.9/5
(27)
Correct Answer:
Verified

protocol

The ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks is called ____________________.

Free
(Short Answer)
4.9/5
(34)
Correct Answer:
Verified

noise

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

B

Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.

(True/False)
4.8/5
(44)

Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.

(True/False)
4.7/5
(42)

A(n) ____________________ system contains pseudo-services that emulate well-known services, but is configured in ways that make it look vulnerable to attacks.

(Short Answer)
4.7/5
(31)

To use a packet sniffer legally, the administrator must __________.

(Multiple Choice)
4.8/5
(35)

A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

(Short Answer)
4.9/5
(27)

A padded cell is a hardened honeynet. _________________________

(True/False)
4.8/5
(38)

A(n) ____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.

(Short Answer)
4.9/5
(33)

List and describe at least four reasons to acquire and use an IDPS.

(Essay)
4.7/5
(30)

The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.

(True/False)
4.8/5
(29)

To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.

(True/False)
4.8/5
(35)

Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker's system to find out as much as possible about the hacker.

(Short Answer)
4.8/5
(39)

An HIDPS can monitor system logs for predefined events.

(True/False)
4.9/5
(35)

A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

(Multiple Choice)
4.7/5
(35)

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

(True/False)
4.8/5
(32)

The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.

(True/False)
4.8/5
(34)

A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

(True/False)
4.8/5
(39)

__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

(Multiple Choice)
5.0/5
(29)
Showing 1 - 20 of 107
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)