Exam 4: Incident Response: Detection and Decision Making
Exam 1: Contingency Planning Within Information Security50 Questions
Exam 2: Planning for Organizational Readiness50 Questions
Exam 3: Incidence Response: Preparation, Organization, and Prevention50 Questions
Exam 4: Incident Response: Detection and Decision Making49 Questions
Exam 5: Incidence Response: Reaction, Recovery, and Maintenance50 Questions
Exam 6: Contingency Strategies for Business Resumption Planning50 Questions
Exam 7: Disaster Recovery: Preparation and Implementation50 Questions
Exam 8: Disaster Recovery: Operation and Maintenance50 Questions
Exam 9: Business Continuity Preparation and Implementation50 Questions
Exam 10: Business Continuity Operations and Maintenance50 Questions
Exam 11: Crisis Management and Human Factors50 Questions
Select questions type
The ____ contains the rules and configuration guidelines governing the implementation and operation of IDSs within the organization.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
D
____________________ is the process of classifying the attack alerts that an IDS detects in order to distinguish or sort false positives from actual attacks more efficiently.
Free
(Short Answer)
4.8/5
(35)
Correct Answer:
Alarm Filtering
A(n)____________________ monitors traffic on a segment of an organization's network.
Free
(Essay)
4.9/5
(38)
Correct Answer:
network-based IDS
NIDS
network-based IDS (NIDS)
Match each statement with an item below.
-Examines data traffic in search of patterns that match known signatures - that is,preconfigured,predetermined attack patterns.
(Multiple Choice)
4.8/5
(31)
The term ____________________ refers to a consolidation of almost identical alarms into a single higher-level alarm.
(Short Answer)
4.8/5
(40)
The smart systems administrator backs up system logs but not system data.
(True/False)
4.8/5
(32)
The term ____ refers to a value associated with an IDS' ability to detect and identify an attack correctly.
(Multiple Choice)
4.8/5
(35)
____ occurs when valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on that network.
(Multiple Choice)
4.9/5
(42)
____ are tools used to identify which computers are active on a network,as well as which ports and services are active on the computers,what function or role the machines may be fulfilling,and so on.
(Multiple Choice)
4.8/5
(27)
A(n)____________________ can adapt its reaction activities based on both guidance learned over time from the administrator as well as circumstances present in the local environment.
(Short Answer)
4.8/5
(32)
The task of monitoring file systems for unauthorized change is best performed by using a(n)____.
(Multiple Choice)
4.9/5
(34)
The only time a HIDS produces a false positive alert is when an authorized change occurs for a monitored file.
(True/False)
4.9/5
(25)
A data packet is defined as invalid when its configuration matches what is defined as valid by the various Internet protocols (TCP,UDP,IP).
(True/False)
4.8/5
(36)
A(n)____ is an indication that a system has just been attacked or continues to be under attack.
(Multiple Choice)
4.8/5
(31)
Many types of intrusions,especially DoS and DDoS attacks,rely on the creation of improperly formed packets to take advantage of weaknesses in the protocol stack in certain operating systems or applications.
(True/False)
4.9/5
(33)
A(n)____ is a type of attack on information assets in which the instigator attempts to gain unauthorized entry into a system or network or disrupt the normal operations of a system or network.
(Multiple Choice)
4.8/5
(31)
Match each statement with an item below.
-Looks for indications of ongoing or successful attacks and resides on a computer or appliance connected to that network segment.
(Multiple Choice)
4.8/5
(32)
Match each statement with an item below.
-A widely used port scanner.
(Multiple Choice)
4.9/5
(34)
Match each statement with an item below.
-Tool used to identify which computers are active on a network,as well as which ports and services are active on the computers,what function or role the machines may be fulfilling,and so on.
(Multiple Choice)
4.9/5
(35)
A ____ is a computer server configured to resemble a production system,containing rich information just begging to be hacked.
(Multiple Choice)
4.7/5
(31)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)