Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security87 Questions
Exam 2: The Need for Security91 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security83 Questions
Exam 4: Planning for Security109 Questions
Exam 5: Risk Management108 Questions
Exam 6: Security Technology: Access Controls, Firewalls, and VPNS106 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools107 Questions
Exam 8: Cryptography109 Questions
Exam 9: Physical Security77 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel77 Questions
Exam 12: Information Security Maintenance116 Questions
Select questions type
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________
(True/False)
4.7/5
(31)
____________________ is the process of attracting attention to a system by placing tantalizing bits of information in key locations.
(Short Answer)
4.8/5
(36)
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________
(True/False)
4.8/5
(33)
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) ____________________.
(Short Answer)
4.7/5
(38)
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
(True/False)
4.9/5
(35)
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
(True/False)
4.9/5
(37)
Preconfigured, predetermined attack patterns are called signatures. _________________________
(True/False)
4.9/5
(39)
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
(Multiple Choice)
4.8/5
(31)
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
(True/False)
4.7/5
(37)
The primary advantages of a centralized IDPS control strategy are cost and ease of use. _________________________
(True/False)
4.8/5
(42)
HIDPSs are also known as system ____________________ verifiers.
(Short Answer)
4.9/5
(37)
A false positive is the failure of an IDPS system to react to an actual attack event.
(True/False)
4.8/5
(38)
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
(Multiple Choice)
5.0/5
(28)
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.
(Multiple Choice)
4.9/5
(42)
A(n) ____________________ IDPS can adapt its reactions in response to administrator guidance over time and circumstances of the current local environment.
(Short Answer)
4.9/5
(38)
A(n) __________ IDPS is focused on protecting network information assets.
(Multiple Choice)
4.9/5
(38)
For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________
(True/False)
4.8/5
(37)
Showing 61 - 80 of 107
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)