Exam 8: Intrusion Detection and Prevention Systems
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?
(Multiple Choice)
4.9/5
(35)
Which of the following is NOT a primary detection methodology?
(Multiple Choice)
4.8/5
(45)
Which of the following is an advantage of a signature-based detection system?
(Multiple Choice)
4.7/5
(30)
Describe two advantages and two disadvantages of a signature-based system.
(Essay)
4.9/5
(33)
MATCHING
-an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through
(Multiple Choice)
4.8/5
(36)
Which of the following is true about an NIDPS versus an HIDPS?
(Multiple Choice)
4.8/5
(34)
Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.
(Short Answer)
4.8/5
(34)
A network ____________ is a type of passive sensor that consists of a direct connection between a sensor and the physical network medium.
(Short Answer)
4.8/5
(38)
MATCHING
-increasing an intrusion response to a higher level
(Multiple Choice)
4.8/5
(33)
Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?
(Multiple Choice)
4.7/5
(35)
MATCHING
-a genuine attack detected successfully by an IDPS
(Multiple Choice)
4.9/5
(42)
MATCHING
-sets of characteristics that describe network services and resources a user or group normally accesses
(Multiple Choice)
4.8/5
(32)
Describe two advantages and two disadvantages of an anomaly-based system.
(Essay)
4.9/5
(36)
A weakness of a signature-based system is that it must keep state information on a possible attack.
(True/False)
4.9/5
(35)
No actual traffic passes through a passive sensor; it only monitors copies of the traffic.
(True/False)
4.9/5
(32)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)