Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

(Multiple Choice)
4.8/5
(33)

A signature-based IDPS is sometimes called a(n) ____________________-based IDPS.

(Short Answer)
4.8/5
(42)

The ability to detect a target computer's __________ is very valuable to an attacker.

(Multiple Choice)
5.0/5
(31)

Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.

(Multiple Choice)
5.0/5
(34)

Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.

(Multiple Choice)
4.9/5
(32)

A(n) ____________________ is a honeypot that has been protected so that it cannot be easily compromised.

(Short Answer)
4.9/5
(39)

__________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

(Multiple Choice)
4.9/5
(33)

Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.

(True/False)
4.7/5
(40)

A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________

(True/False)
4.8/5
(40)

An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.

(True/False)
4.8/5
(39)

__________ is the action of luring an individual into committing a crime to get a conviction.

(Multiple Choice)
4.9/5
(39)

In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.

(True/False)
4.8/5
(33)

An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.

(True/False)
4.8/5
(43)

A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________

(True/False)
4.8/5
(35)

A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.

(True/False)
4.9/5
(30)

IDPSs can help the organization protect its assets when its networks and systems are exposed to ____________________ vulnerabilities or are unable to respond to a rapidly changing threat environment.

(Short Answer)
4.8/5
(39)

Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________

(True/False)
4.9/5
(43)

Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.

(Multiple Choice)
4.7/5
(34)

Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________

(True/False)
4.9/5
(44)

__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

(Multiple Choice)
4.9/5
(30)
Showing 41 - 60 of 107
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)