Exam 8: Intrusion Detection and Prevention Systems
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
An IDPS __________________ server is the central repository for sensor and agent data.
Free
(Short Answer)
4.7/5
(37)
Correct Answer:
management
Which of the following is NOT a typical IDPS component?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
Which of the following is NOT a network defense function found in intrusion detection and prevention systems?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
__________________ procedures are a set of actions that are spelled out in the security policy and followed if the IDPS detects a true positive.
(Short Answer)
4.9/5
(35)
What are the four common entry points to a network where sensors should be placed?
(Essay)
4.8/5
(39)
Which IDPS customization option is a list of entities known to be harmless?
(Multiple Choice)
4.9/5
(28)
In a _______________ based detection system,the IDPS can begin working immediately after installation.
(Short Answer)
4.9/5
(29)
MATCHING
-an attempt to gain unauthorized access to network resources
(Multiple Choice)
4.9/5
(34)
MATCHING
-the process of maintaining a table of current connections so that abnormal traffic can be identified
(Multiple Choice)
4.9/5
(23)
An IDPS consists of a single device that you install between your firewall and the Internet.
(True/False)
4.8/5
(44)
MATCHING
-an IDPS component that monitors traffic on a network segment
(Multiple Choice)
4.8/5
(33)
Which approach to stateful protocol analysis involves detection of the protocol in use,followed by activation of analyzers that can identify applications not using standard ports?
(Multiple Choice)
4.9/5
(39)
An NIDPS can tell you whether an attack attempt on the host was successful.
(True/False)
4.9/5
(43)
Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic,is resource intensive,and requires extensive tuning and maintenance?
(Multiple Choice)
4.8/5
(38)
What are the three network defense functions performed by an IDPS?
(Short Answer)
4.8/5
(37)
MATCHING
-the ability to track an attempted attack or intrusion back to its source
(Multiple Choice)
4.8/5
(35)
MATCHING
-an NIDPS sensor that examines copies of traffic on the network
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)