Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Alarm ____________________ and compaction is a consolidation of almost identical alarms that happen at close to the same time into a single higher-level alarm.

(Short Answer)
4.9/5
(36)

__________ is the process of classifying IDPS alerts so that they can be more effectively managed.

(Multiple Choice)
4.9/5
(38)

Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.

(True/False)
4.9/5
(44)

Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.

(True/False)
5.0/5
(38)

Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________

(True/False)
4.7/5
(36)

Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.

(True/False)
4.8/5
(37)

Intrusion detection and prevention systems can deal effectively with switched networks.

(True/False)
4.9/5
(37)

HIDPSs are also known as system integrity verifiers.

(True/False)
4.9/5
(40)

In ____________________ protocol verification, the higher-order protocols are examined for unexpected packet behavior or improper use.

(Short Answer)
4.8/5
(36)

Which of the following is NOT a described IDPS control strategy  

(Multiple Choice)
4.7/5
(38)

A(n) event is an indication that a system has just been attacked or is under attack. _________________________

(True/False)
4.9/5
(41)

List and describe the four advantages of HIDPSs.

(Essay)
4.7/5
(33)

Three methods dominate IDPS detection methods: the ____________________-based approach, the statistical anomaly-based approach, and the stateful packet inspection approach.

(Short Answer)
4.9/5
(40)

A(n) server-based IDPS protects the server or host's information assets. _________________________

(True/False)
4.9/5
(42)

In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________

(True/False)
4.8/5
(35)

Which of the following ports is commonly used for the HTTP protocol  

(Multiple Choice)
4.8/5
(27)

A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

(Multiple Choice)
4.8/5
(39)

A(n) log file monitor is similar to an NIDPS. _________________________

(True/False)
4.8/5
(41)

A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

(Multiple Choice)
4.7/5
(39)

The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________

(True/False)
4.7/5
(37)
Showing 81 - 100 of 107
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)