Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In DNS cache poisoning,valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on the network.

(True/False)
4.9/5
(36)

A(n)____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system,almost always with the intent to do harm.

(Short Answer)
4.9/5
(30)

The trace usually consists of a honeypot or padded cell and an alarm._________________________

(True/False)
4.8/5
(36)

The ____________________ port is also known as a switched port analysis port or mirror port.

(Short Answer)
5.0/5
(32)

____________________ is the process of attracting attention to a system by placing tantalizing bits of information in key locations.

(Short Answer)
5.0/5
(37)

HIDPSs are also known as system integrity verifiers.

(True/False)
4.9/5
(39)

The ____ is the level at which the number of false rejections equals the false acceptances,and is also known as the equal error rate.

(Multiple Choice)
4.9/5
(25)

A(n)____ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window)and activates an alarm.

(Multiple Choice)
4.7/5
(42)

A(n)port is a network channel or connection point in a data communications system._________________________

(True/False)
4.8/5
(35)

A(n)____ is a network tool that collects copies of packets from the network and analyzes them.

(Multiple Choice)
4.9/5
(41)

The false detect rate is the percentage of identification instances in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device._________________________

(True/False)
4.8/5
(43)

In order to determine which IDPS best meets an organization's needs,first consider the organizational environment in technical,physical,and political terms.

(True/False)
4.8/5
(33)

A(n)NIDPS functions on the host system,where encrypted traffic will have been decrypted and is available for processing._________________________

(True/False)
5.0/5
(30)

A sniffer cannot be used to eavesdrop on network traffic.

(True/False)
4.8/5
(39)

____ is the process of classifying IDPS alerts so that they can be more effectively managed.

(Multiple Choice)
4.8/5
(38)

A(n)____ is a proposed systems user.

(Multiple Choice)
4.9/5
(36)

A padded cell is a hardened honeynet._________________________

(True/False)
4.8/5
(45)

A false positive is the failure of an IDPS system to react to an actual attack event.

(True/False)
4.9/5
(39)

Intrusion detection and prevention systems can deal effectively with switched networks.

(True/False)
4.9/5
(42)

The Simple Network Management Protocol contains trap functions,which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed,either positively or negatively.

(True/False)
4.9/5
(48)
Showing 81 - 100 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)