Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
The attack ____________________ is a series of steps or processes used by an attacker, in a logical sequence, to launch an attack against a target system or network.
Free
(Short Answer)
4.9/5
(27)
Correct Answer:
protocol
The ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks is called ____________________.
Free
(Short Answer)
4.9/5
(34)
Correct Answer:
noise
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
B
Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.
(True/False)
4.8/5
(44)
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
(True/False)
4.7/5
(42)
A(n) ____________________ system contains pseudo-services that emulate well-known services, but is configured in ways that make it look vulnerable to attacks.
(Short Answer)
4.7/5
(31)
To use a packet sniffer legally, the administrator must __________.
(Multiple Choice)
4.8/5
(35)
A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
(Short Answer)
4.9/5
(27)
A(n) ____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.
(Short Answer)
4.9/5
(33)
The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
(True/False)
4.8/5
(29)
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
(True/False)
4.8/5
(35)
Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker's system to find out as much as possible about the hacker.
(Short Answer)
4.8/5
(39)
A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.
(Multiple Choice)
4.7/5
(35)
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
(True/False)
4.8/5
(32)
The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.
(True/False)
4.8/5
(34)
A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
(True/False)
4.8/5
(39)
__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.
(Multiple Choice)
5.0/5
(29)
Showing 1 - 20 of 107
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)