Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To assist in the footprint intelligence collection process,you can use an enhanced Web scanner that,among other things,can scan entire Web sites for valuable pieces of information,such as server names and e-mail addresses.

(True/False)
4.8/5
(31)

An IDPS can be configured to dial a phone number and produce an alphanumeric page or a modem noise.

(True/False)
4.9/5
(40)

Port fingers are tools used by both attackers and defenders to identify (or fingerprint)the computers that are active on a network,as well as the ports and services active on those computers,the functions and roles the machines are fulfilling,and other useful information._________________________

(True/False)
4.8/5
(42)

Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as ____.

(Multiple Choice)
4.8/5
(43)

A packet ____________________ is a network tool that collects copies of packets from the network and analyzes them.

(Short Answer)
4.9/5
(37)

When a collection of honeypots connects several honeypot systems on a subnet,it may be called a(n)honeynet._________________________

(True/False)
4.8/5
(30)

Three methods dominate the IDPSs detection methods: ____________________-based approach,statistical anomaly-based approach or the stateful packet inspection approach.

(Short Answer)
4.8/5
(33)

Nmap uses incrementing Time-To-Live packets to determine the path into a network as well as the default firewall policy.

(True/False)
4.9/5
(36)

HIDPSs are also known as system ____________________ verifiers.

(Short Answer)
4.8/5
(47)

A(n)partially distributed IDPS control strategy combines the best of the other two strategies._________________________

(True/False)
4.8/5
(36)

To determine whether an attack has occurred or is underway,NIDPSs compare measured activity to known ____ in their knowledge base.

(Multiple Choice)
4.7/5
(36)

Services using the TCP/IP protocol can run only on port 80.

(True/False)
4.7/5
(43)

A(n)____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

(Essay)
4.8/5
(35)

The attack ____________________ is a series of steps or processes used by an attacker,in a logical sequence,to launch an attack against a target system or network.

(Short Answer)
4.9/5
(40)

Preconfigured,predetermined attack patterns are called signatures._________________________

(True/False)
5.0/5
(33)

A passive response is a definitive action automatically initiated when certain types of alerts are triggered.

(True/False)
4.9/5
(37)

____ sensors are typically intended for network perimeter use,so they would be deployed in close proximity to the perimeter firewalls,often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

(Multiple Choice)
4.9/5
(42)

Your organization's operational goals,constraints,and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.

(True/False)
5.0/5
(47)

The trap is a process by which the organization attempts to identify an entity discovered in unauthorized areas of the network or systems._________________________

(True/False)
4.7/5
(39)

Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization._________________________

(True/False)
4.8/5
(30)
Showing 21 - 40 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)