Exam 8: Intrusion Detection and Prevention Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

List four types of information that an NIDPS typically logs.

(Essay)
4.9/5
(37)

Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?

(Multiple Choice)
4.9/5
(35)

Which of the following is NOT a primary detection methodology?

(Multiple Choice)
4.8/5
(45)

Which of the following is an advantage of a signature-based detection system?

(Multiple Choice)
4.7/5
(30)

Describe two advantages and two disadvantages of a signature-based system.

(Essay)
4.9/5
(33)

MATCHING -an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through

(Multiple Choice)
4.8/5
(36)

Which of the following is true about an NIDPS versus an HIDPS?

(Multiple Choice)
4.8/5
(34)

Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.

(Short Answer)
4.8/5
(34)

A network ____________ is a type of passive sensor that consists of a direct connection between a sensor and the physical network medium.

(Short Answer)
4.8/5
(38)

MATCHING -increasing an intrusion response to a higher level

(Multiple Choice)
4.8/5
(33)

Where is a host-based IDPS agent typically placed?

(Multiple Choice)
4.8/5
(34)

Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?

(Multiple Choice)
4.7/5
(35)

MATCHING -a genuine attack detected successfully by an IDPS

(Multiple Choice)
4.9/5
(42)

MATCHING -sets of characteristics that describe network services and resources a user or group normally accesses

(Multiple Choice)
4.8/5
(32)

List two approaches to stateful protocol analysis.

(Essay)
4.8/5
(41)

Which of the following is true about an HIDPS?

(Multiple Choice)
4.9/5
(42)

Which of the following is an IDPS security best practice?

(Multiple Choice)
4.8/5
(37)

Describe two advantages and two disadvantages of an anomaly-based system.

(Essay)
4.9/5
(36)

A weakness of a signature-based system is that it must keep state information on a possible attack.

(True/False)
4.9/5
(35)

No actual traffic passes through a passive sensor; it only monitors copies of the traffic.

(True/False)
4.9/5
(32)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)