Exam 4: Incident Response: Detection and Decision Making

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)____ is an event that triggers alarms and causes a false positive when no actual attacks are in progress.

(Multiple Choice)
4.8/5
(29)

A(n)____ is designed to be placed in a network to determine whether or not the network is being used in ways that are out of compliance with the policy of the organization.

(Multiple Choice)
4.7/5
(28)

What are the advantages and disadvantages of HIDS?

(Essay)
4.9/5
(37)

According to Pipkin,what are the four types of incident candidates that are probable indicators of actual incidents? Provide a brief description of each incident candidate.

(Essay)
4.8/5
(43)

Match each statement with an item below. -Network burglar alarm.

(Multiple Choice)
5.0/5
(43)

Match each statement with an item below. -The action of luring an individual into committing a crime to get a conviction.

(Multiple Choice)
4.7/5
(31)

____ are also known as system integrity verifiers.

(Multiple Choice)
4.9/5
(37)

____ is an ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks.

(Multiple Choice)
4.8/5
(36)

The failure of an IDS system to react to an actual attack event is known as a ____.

(Multiple Choice)
4.7/5
(40)

Match each statement with an item below. -The process of attracting attention to a system by placing tantalizing bits of information in key locations.

(Multiple Choice)
4.7/5
(41)

Using a process known as ____,Network IDSs must look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be underway.

(Multiple Choice)
4.9/5
(43)

The purpose of a NIDS is to look for patterns within network traffic that indicate an intrusion event is underway or about to begin.

(True/False)
4.8/5
(41)

Match each statement with an item below. -Can indicate if a relationship exists between the individual alarm elements when they have specific similar attributes.

(Multiple Choice)
4.8/5
(35)

A ____ is an alarm or alert that indicates that an attack is in progress or that an attack has successfully occurred when in fact there was no such attack.

(Multiple Choice)
4.9/5
(39)

Briefly describe the tasks involved in managing logs.

(Essay)
4.7/5
(45)

Discuss two weaknesses of the signature-based IDS technology.

(Essay)
5.0/5
(27)

What are the steps involved in monitoring networks for signs of intrusion?

(Essay)
4.9/5
(30)

The term ____ refers to an event that triggers alarms and causes an IDS to react as if a real attack is in progress.

(Multiple Choice)
4.8/5
(33)

When placed next to a hub,switch,or other key networking device,the NIDS may use that device's monitoring port,also known as a(n)____ port or mirror port.

(Multiple Choice)
4.9/5
(44)

List five reasons why you would acquire and use an IDS.

(Essay)
4.7/5
(41)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)