Exam 8: Intrusion Detection and Prevention Systems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is considered a problem with a passive,signature-based system?

(Multiple Choice)
4.8/5
(37)

If you see a /16 in the header of a snort rule,what does it mean?

(Multiple Choice)
4.9/5
(37)

Define stateful protocol analysis.Include in your answer the concept of the event horizon.

(Essay)
4.9/5
(44)

Why might you want to allow extra time for setting up the database in an anomaly-based system?

(Multiple Choice)
4.7/5
(41)

What are the four typical components of an IDPS?

(Essay)
4.8/5
(40)

The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?

(Multiple Choice)
4.8/5
(41)

A hybrid IDPS combines aspects of NIDPS and HIDPS configurations.

(True/False)
4.8/5
(41)

Which of the following is NOT a method used by passive sensors to monitor traffic?

(Multiple Choice)
5.0/5
(29)

Which of the following is true about the steps in setting up and using an IDPS?

(Multiple Choice)
5.0/5
(33)

Contrast anomaly detection with signature detection.

(Essay)
4.8/5
(37)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)