Exam 8: Intrusion Detection and Prevention Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An IDPS __________________ server is the central repository for sensor and agent data.

Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Verified

management

Which of the following is NOT a typical IDPS component?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

Which of the following is NOT a network defense function found in intrusion detection and prevention systems?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

__________________ procedures are a set of actions that are spelled out in the security policy and followed if the IDPS detects a true positive.

(Short Answer)
4.9/5
(35)

What are the four common entry points to a network where sensors should be placed?

(Essay)
4.8/5
(39)

Which IDPS customization option is a list of entities known to be harmless?

(Multiple Choice)
4.9/5
(28)

What is an inline sensor and how is it used to stop attacks?

(Essay)
4.8/5
(40)

In a _______________ based detection system,the IDPS can begin working immediately after installation.

(Short Answer)
4.9/5
(29)

What is an advantage of the anomaly detection method?

(Multiple Choice)
4.7/5
(37)

MATCHING -an attempt to gain unauthorized access to network resources

(Multiple Choice)
4.9/5
(34)

MATCHING -the process of maintaining a table of current connections so that abnormal traffic can be identified

(Multiple Choice)
4.9/5
(23)

An IDPS consists of a single device that you install between your firewall and the Internet.

(True/False)
4.8/5
(44)

MATCHING -the entire length of an attack

(Multiple Choice)
4.9/5
(44)

MATCHING -an IDPS component that monitors traffic on a network segment

(Multiple Choice)
4.8/5
(33)

Which approach to stateful protocol analysis involves detection of the protocol in use,followed by activation of analyzers that can identify applications not using standard ports?

(Multiple Choice)
4.9/5
(39)

An NIDPS can tell you whether an attack attempt on the host was successful.

(True/False)
4.9/5
(43)

Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic,is resource intensive,and requires extensive tuning and maintenance?

(Multiple Choice)
4.8/5
(38)

What are the three network defense functions performed by an IDPS?

(Short Answer)
4.8/5
(37)

MATCHING -the ability to track an attempted attack or intrusion back to its source

(Multiple Choice)
4.8/5
(35)

MATCHING -an NIDPS sensor that examines copies of traffic on the network

(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)