Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________

(True/False)
4.7/5
(33)

To secure data in transit across any network, organizations must use ____________________ to be assured of content privacy.

(Short Answer)
4.8/5
(43)

A(n) ____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.

(Short Answer)
4.7/5
(38)

____________________ is a systematic survey of all of the target organization's Internet addresses.

(Short Answer)
4.9/5
(34)

A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.

(True/False)
4.9/5
(39)

In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.

(True/False)
4.8/5
(38)

Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.

(Multiple Choice)
4.8/5
(40)
Showing 101 - 107 of 107
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)