Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.
(Multiple Choice)
4.8/5
(33)
A signature-based IDPS is sometimes called a(n) ____________________-based IDPS.
(Short Answer)
4.8/5
(42)
The ability to detect a target computer's __________ is very valuable to an attacker.
(Multiple Choice)
5.0/5
(31)
Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.
(Multiple Choice)
5.0/5
(34)
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.
(Multiple Choice)
4.9/5
(32)
A(n) ____________________ is a honeypot that has been protected so that it cannot be easily compromised.
(Short Answer)
4.9/5
(39)
__________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.
(Multiple Choice)
4.9/5
(33)
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
(True/False)
4.7/5
(40)
A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________
(True/False)
4.8/5
(40)
An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
(True/False)
4.8/5
(39)
__________ is the action of luring an individual into committing a crime to get a conviction.
(Multiple Choice)
4.9/5
(39)
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.
(True/False)
4.8/5
(33)
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
(True/False)
4.8/5
(43)
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________
(True/False)
4.8/5
(35)
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
(True/False)
4.9/5
(30)
IDPSs can help the organization protect its assets when its networks and systems are exposed to ____________________ vulnerabilities or are unable to respond to a rapidly changing threat environment.
(Short Answer)
4.8/5
(39)
Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________
(True/False)
4.9/5
(43)
Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.
(Multiple Choice)
4.7/5
(34)
Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________
(True/False)
4.9/5
(44)
__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.
(Multiple Choice)
4.9/5
(30)
Showing 41 - 60 of 107
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)