Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Alarm filtering is alarm clustering that may be based on combinations of frequency,similarity in attack signature,similarity in attack target,or other criteria that are defined by the system administrators._________________________

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

IDPS responses can be classified as active or passive.

Free
(True/False)
4.8/5
(26)
Correct Answer:
Verified

True

For Linux or BSD systems,there is a tool called "scanner" that allows a remote individual to "mirror" entire Web sites._________________________

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

Enticement is the action of luring an individual into committing a crime to get a conviction._________________________

(True/False)
4.8/5
(37)

With a(n)____________________ IDPS control strategy all IDPS control functions are implemented and managed in a central location.

(Essay)
4.8/5
(41)

The activities that gather information about the organization and its network activities and assets is called fingerprinting._________________________

(True/False)
4.8/5
(35)

Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.

(True/False)
4.8/5
(39)

In TCP/IP networking,port ____ is not used.

(Multiple Choice)
4.8/5
(39)

A(n)____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.

(Short Answer)
4.8/5
(30)

____________________ is a systematic survey of all of the target organization's Internet addresses.

(Short Answer)
4.8/5
(41)

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

(True/False)
4.9/5
(38)

All IDPS vendors target users with the same levels of technical and security expertise.

(True/False)
4.8/5
(37)

NIDPSs can reliably ascertain if an attack was successful or not.

(True/False)
4.7/5
(41)

List and describe the three advantages of NIDPSs.

(Essay)
4.9/5
(38)

____ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

(Multiple Choice)
4.9/5
(48)

____ is an event that triggers an alarm when no actual attack is in progress.

(Multiple Choice)
4.7/5
(31)

Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

(Multiple Choice)
4.8/5
(37)

Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.

(True/False)
4.8/5
(43)

The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.

(True/False)
4.9/5
(43)

Minutiae are unique points of reference that are digitized and stored in an encrypted format when the user's system access credentials are created._________________________

(True/False)
4.9/5
(35)
Showing 1 - 20 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)