Exam 9: Internet and Network Forensics and Intrusion Detection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the firewall type with its description. -Proxy firewall

(Multiple Choice)
4.8/5
(35)
Match the type of analysis with its function or description.
Content
Correlates events in a chronological order
Playback
Can recreate entire “conversations”
Pattern
Uses a baseline to detect abnormalities
Correct Answer:
Verified
Premises:
Responses:
Content
Correlates events in a chronological order
Playback
Can recreate entire “conversations”
Pattern
Uses a baseline to detect abnormalities
Timeline sequencing
Uses sophisticated algorithms
(Matching)
4.8/5
(38)

A(n)________ is the standard operation procedures of the network when it is running normally.

(Short Answer)
4.9/5
(34)

Match the firewall type with its description. -Network layer

(Multiple Choice)
4.9/5
(30)

An IDS is considered by most system administrators to be a(n)________ security system.

(Short Answer)
4.9/5
(29)

Software clients called ________ installed on network devices are designed to collect information from the host.

(Short Answer)
5.0/5
(33)

Match the NFAT components with their description. -Server

(Multiple Choice)
4.8/5
(36)

NFAT software can be configured to accept input from almost any device that generates a(n)________ file.

(Short Answer)
4.7/5
(36)

NFAT systems generally require large amounts of storage space,such as a(n)________ system.

(Short Answer)
4.8/5
(42)

Match the firewall type with its description. -Application layer

(Multiple Choice)
4.8/5
(32)

________ analysis is also known as deep packet inspection.

(Short Answer)
4.9/5
(31)

The ________ is a major source of forensic data in both the stand-alone and network forensic fields.

(Short Answer)
4.8/5
(35)

What is considered as the primary problem associated with enterprise-level IDS tools?

(Multiple Choice)
4.9/5
(33)

________ transmit and receive data via radio frequency in the open.

(Short Answer)
4.9/5
(28)

The generation of logs on devices such as routers,proxies,and firewalls should always be set to the ________ at which your network can operate.

(Short Answer)
4.9/5
(28)

Which of the following data-capture methods uses a filtering system approach?

(Multiple Choice)
4.8/5
(45)

What is considered as the first attempt to address the increasing number of attacks on networks?

(Multiple Choice)
5.0/5
(40)

Identifying situations such as regular spikes in late-night traffic is an example of

(Multiple Choice)
5.0/5
(32)

The feature of modern switches called ________ duplicates the information going into a port to the SPAN port.

(Short Answer)
5.0/5
(47)

A(n)________ repeats all data received on any port to the remaining ports;it is gradually being replaced by switches and SPAN systems.

(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)