Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
Alarm filtering is alarm clustering that may be based on combinations of frequency,similarity in attack signature,similarity in attack target,or other criteria that are defined by the system administrators._________________________
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
IDPS responses can be classified as active or passive.
Free
(True/False)
4.8/5
(26)
Correct Answer:
True
For Linux or BSD systems,there is a tool called "scanner" that allows a remote individual to "mirror" entire Web sites._________________________
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
Enticement is the action of luring an individual into committing a crime to get a conviction._________________________
(True/False)
4.8/5
(37)
With a(n)____________________ IDPS control strategy all IDPS control functions are implemented and managed in a central location.
(Essay)
4.8/5
(41)
The activities that gather information about the organization and its network activities and assets is called fingerprinting._________________________
(True/False)
4.8/5
(35)
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
(True/False)
4.8/5
(39)
A(n)____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.
(Short Answer)
4.8/5
(30)
____________________ is a systematic survey of all of the target organization's Internet addresses.
(Short Answer)
4.8/5
(41)
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
(True/False)
4.9/5
(38)
All IDPS vendors target users with the same levels of technical and security expertise.
(True/False)
4.8/5
(37)
NIDPSs can reliably ascertain if an attack was successful or not.
(True/False)
4.7/5
(41)
____ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.
(Multiple Choice)
4.9/5
(48)
____ is an event that triggers an alarm when no actual attack is in progress.
(Multiple Choice)
4.7/5
(31)
Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
(Multiple Choice)
4.8/5
(37)
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
(True/False)
4.8/5
(43)
The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
(True/False)
4.9/5
(43)
Minutiae are unique points of reference that are digitized and stored in an encrypted format when the user's system access credentials are created._________________________
(True/False)
4.9/5
(35)
Showing 1 - 20 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)