Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
When the measured activity is outside the baseline parameters,it is said to exceed the ____________________ level.
(Essay)
4.9/5
(36)
Among all possible biometrics,____ is(are)considered truly unique.
(Multiple Choice)
4.7/5
(40)
A strategy based on the concept of defense in depth is likely to include intrusion detection systems,active vulnerability scanners,passive vulnerability scanners,automated log analyzers,and protocol analyzers.
(True/False)
4.9/5
(46)
When a collection of honeypots connects several honeypot systems on a subnet,it may be called a(n)____________________.
(Short Answer)
4.9/5
(38)
A(n)server-based IDPS protects the server or host's information assets._________________________
(True/False)
4.8/5
(29)
IDPS researchers have used padded cell and honeypot systems since the late ____.
(Multiple Choice)
4.8/5
(34)
____ is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.
(Multiple Choice)
4.9/5
(34)
To secure data in transit across any network,organizations must use ____________________ to be assured of content privacy.
(Short Answer)
4.9/5
(37)
A(n)listener vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software._________________________
(True/False)
4.9/5
(37)
The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.
(True/False)
4.8/5
(43)
____ applications use a combination of techniques to detect an intrusion and then trace it back to its source.
(Multiple Choice)
4.7/5
(36)
A(n)____ IDPS is focused on protecting network information assets.
(Multiple Choice)
4.7/5
(35)
Under the guise of justice,some less scrupulous administrators may be tempted to ____________________,or hack into a hacker's system to find out as much as possible about the hacker.
(Essay)
4.8/5
(28)
A HIDPS is optimized to detect multihost scanning,and it is able to detect the scanning of non-host network devices,such as routers or switches.
(True/False)
4.8/5
(42)
Most of the technologies that scan human characteristics convert these images to some form of minutiae.
(True/False)
4.7/5
(37)
A(n)log file monitor is similar to a NIDPS._________________________
(True/False)
4.9/5
(33)
A signature-based IDPS is sometimes called a(n)____________________-based IDPS.
(Short Answer)
4.9/5
(31)
An alert or intrusion is an indication that a system has just been attacked or is under attack._________________________
(True/False)
4.9/5
(40)
Showing 61 - 80 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)