Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When the measured activity is outside the baseline parameters,it is said to exceed the ____________________ level.

(Essay)
4.9/5
(36)

Among all possible biometrics,____ is(are)considered truly unique.

(Multiple Choice)
4.7/5
(40)

A HIDPS can monitor systems logs for predefined events.

(True/False)
4.8/5
(33)

A strategy based on the concept of defense in depth is likely to include intrusion detection systems,active vulnerability scanners,passive vulnerability scanners,automated log analyzers,and protocol analyzers.

(True/False)
4.9/5
(46)

When a collection of honeypots connects several honeypot systems on a subnet,it may be called a(n)____________________.

(Short Answer)
4.9/5
(38)

A(n)server-based IDPS protects the server or host's information assets._________________________

(True/False)
4.8/5
(29)

IDPS researchers have used padded cell and honeypot systems since the late ____.

(Multiple Choice)
4.8/5
(34)

____ is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

(Multiple Choice)
4.9/5
(34)

To secure data in transit across any network,organizations must use ____________________ to be assured of content privacy.

(Short Answer)
4.9/5
(37)

A(n)listener vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software._________________________

(True/False)
4.9/5
(37)

The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.

(True/False)
4.8/5
(43)

____ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

(Multiple Choice)
4.7/5
(36)

A(n)____ IDPS is focused on protecting network information assets.

(Multiple Choice)
4.7/5
(35)

Under the guise of justice,some less scrupulous administrators may be tempted to ____________________,or hack into a hacker's system to find out as much as possible about the hacker.

(Essay)
4.8/5
(28)

A HIDPS is optimized to detect multihost scanning,and it is able to detect the scanning of non-host network devices,such as routers or switches.

(True/False)
4.8/5
(42)

Most of the technologies that scan human characteristics convert these images to some form of minutiae.

(True/False)
4.7/5
(37)

A(n)log file monitor is similar to a NIDPS._________________________

(True/False)
4.9/5
(33)

A signature-based IDPS is sometimes called a(n)____________________-based IDPS.

(Short Answer)
4.9/5
(31)

List and describe the four advantages of HIDPSs.

(Essay)
4.8/5
(32)

An alert or intrusion is an indication that a system has just been attacked or is under attack._________________________

(True/False)
4.9/5
(40)
Showing 61 - 80 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)