Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
All IDPS vendors target users with the same levels of technical and security expertise.
(True/False)
4.7/5
(37)
The disadvantages of using the honeypot or padded cell approach include the fact that the technical implications of using such devices are not well understood. _________________________
(True/False)
4.9/5
(32)
The ____________________ port is also known as a switched port analysis (SPAN) port or mirror port.
(Short Answer)
4.8/5
(45)
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
(True/False)
4.9/5
(48)
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
(True/False)
4.8/5
(32)
When the measured activity is outside the baseline parameters, it is said to exceed the ____________________ level.
(Short Answer)
4.9/5
(42)
With a(n) ____________________ IDPS control strategy, all IDPS control functions are implemented and managed in a central location.
(Short Answer)
4.8/5
(28)
A fully distributed IDPS control strategy is an IDPS implementation approach in which all controlfunctions are applied at the physical location of each IDPS component.
(True/False)
4.9/5
(41)
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
(True/False)
4.8/5
(37)
A ____________________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.
(Short Answer)
4.8/5
(38)
A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________
(True/False)
4.7/5
(38)
A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.
(Multiple Choice)
4.7/5
(42)
__________ are decoy systems designed to lure potential attackers away from critical systems.
(Multiple Choice)
4.8/5
(34)
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.
(True/False)
4.9/5
(40)
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________
(True/False)
4.8/5
(37)
A packet ____________________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.
(Short Answer)
4.8/5
(31)
A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________
(True/False)
4.9/5
(37)
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
(True/False)
4.8/5
(40)
____________________ scanning will allow an Nmap user to bounce a scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.
(Short Answer)
4.8/5
(30)
Showing 21 - 40 of 107
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)