Exam 8: Intrusion Detection and Prevention Systems
Exam 1: Network Security Fundamentals50 Questions
Exam 2: TCP-IP50 Questions
Exam 3: Network Traffic Signatures49 Questions
Exam 4: Routing Fundamentals50 Questions
Exam 5: Cryptography50 Questions
Exam 6: Wireless Network Fundamentals50 Questions
Exam 7: Understanding Wireless Security50 Questions
Exam 8: Intrusion Detection and Prevention Systems50 Questions
Exam 9: Firewalls50 Questions
Exam 10: Firewall Design and Management50 Questions
Exam 11: VPN Concepts50 Questions
Exam 12: Internet and World Wide Web Security50 Questions
Exam 13: Security Policy Design and Implementation50 Questions
Exam 14: On-Going Security Management50 Questions
Select questions type
Which of the following is considered a problem with a passive,signature-based system?
(Multiple Choice)
4.8/5
(37)
If you see a /16 in the header of a snort rule,what does it mean?
(Multiple Choice)
4.9/5
(37)
Define stateful protocol analysis.Include in your answer the concept of the event horizon.
(Essay)
4.9/5
(44)
Why might you want to allow extra time for setting up the database in an anomaly-based system?
(Multiple Choice)
4.7/5
(41)
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?
(Multiple Choice)
4.8/5
(41)
A hybrid IDPS combines aspects of NIDPS and HIDPS configurations.
(True/False)
4.8/5
(41)
Which of the following is NOT a method used by passive sensors to monitor traffic?
(Multiple Choice)
5.0/5
(29)
Which of the following is true about the steps in setting up and using an IDPS?
(Multiple Choice)
5.0/5
(33)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)