Exam 4: Incident Response: Detection and Decision Making
Exam 1: Contingency Planning Within Information Security50 Questions
Exam 2: Planning for Organizational Readiness50 Questions
Exam 3: Incidence Response: Preparation, Organization, and Prevention50 Questions
Exam 4: Incident Response: Detection and Decision Making49 Questions
Exam 5: Incidence Response: Reaction, Recovery, and Maintenance50 Questions
Exam 6: Contingency Strategies for Business Resumption Planning50 Questions
Exam 7: Disaster Recovery: Preparation and Implementation50 Questions
Exam 8: Disaster Recovery: Operation and Maintenance50 Questions
Exam 9: Business Continuity Preparation and Implementation50 Questions
Exam 10: Business Continuity Operations and Maintenance50 Questions
Exam 11: Crisis Management and Human Factors50 Questions
Select questions type
A(n)____ is an event that triggers alarms and causes a false positive when no actual attacks are in progress.
(Multiple Choice)
4.8/5
(29)
A(n)____ is designed to be placed in a network to determine whether or not the network is being used in ways that are out of compliance with the policy of the organization.
(Multiple Choice)
4.7/5
(28)
According to Pipkin,what are the four types of incident candidates that are probable indicators of actual incidents? Provide a brief description of each incident candidate.
(Essay)
4.8/5
(43)
Match each statement with an item below.
-Network burglar alarm.
(Multiple Choice)
5.0/5
(43)
Match each statement with an item below.
-The action of luring an individual into committing a crime to get a conviction.
(Multiple Choice)
4.7/5
(31)
____ is an ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks.
(Multiple Choice)
4.8/5
(36)
The failure of an IDS system to react to an actual attack event is known as a ____.
(Multiple Choice)
4.7/5
(40)
Match each statement with an item below.
-The process of attracting attention to a system by placing tantalizing bits of information in key locations.
(Multiple Choice)
4.7/5
(41)
Using a process known as ____,Network IDSs must look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be underway.
(Multiple Choice)
4.9/5
(43)
The purpose of a NIDS is to look for patterns within network traffic that indicate an intrusion event is underway or about to begin.
(True/False)
4.8/5
(41)
Match each statement with an item below.
-Can indicate if a relationship exists between the individual alarm elements when they have specific similar attributes.
(Multiple Choice)
4.8/5
(35)
A ____ is an alarm or alert that indicates that an attack is in progress or that an attack has successfully occurred when in fact there was no such attack.
(Multiple Choice)
4.9/5
(39)
What are the steps involved in monitoring networks for signs of intrusion?
(Essay)
4.9/5
(30)
The term ____ refers to an event that triggers alarms and causes an IDS to react as if a real attack is in progress.
(Multiple Choice)
4.8/5
(33)
When placed next to a hub,switch,or other key networking device,the NIDS may use that device's monitoring port,also known as a(n)____ port or mirror port.
(Multiple Choice)
4.9/5
(44)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)