Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Exam 1: Introduction to Information Security78 Questions
Exam 2: The Need for Security78 Questions
Exam 3: Legal, Ethical, and Professional Issues in Information Security78 Questions
Exam 4: Risk Management108 Questions
Exam 5: Planning for Security108 Questions
Exam 6: Security Technology: Firewalls and Vpns108 Questions
Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools108 Questions
Exam 8: Cryptography108 Questions
Exam 9: Physical Security78 Questions
Exam 10: Implementing Information Security78 Questions
Exam 11: Security and Personnel78 Questions
Exam 12: Information Security Maintenance103 Questions
Select questions type
In DNS cache poisoning,valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on the network.
(True/False)
4.9/5
(36)
A(n)____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system,almost always with the intent to do harm.
(Short Answer)
4.9/5
(30)
The trace usually consists of a honeypot or padded cell and an alarm._________________________
(True/False)
4.8/5
(36)
The ____________________ port is also known as a switched port analysis port or mirror port.
(Short Answer)
5.0/5
(32)
____________________ is the process of attracting attention to a system by placing tantalizing bits of information in key locations.
(Short Answer)
5.0/5
(37)
The ____ is the level at which the number of false rejections equals the false acceptances,and is also known as the equal error rate.
(Multiple Choice)
4.9/5
(25)
A(n)____ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window)and activates an alarm.
(Multiple Choice)
4.7/5
(42)
A(n)port is a network channel or connection point in a data communications system._________________________
(True/False)
4.8/5
(35)
A(n)____ is a network tool that collects copies of packets from the network and analyzes them.
(Multiple Choice)
4.9/5
(41)
The false detect rate is the percentage of identification instances in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device._________________________
(True/False)
4.8/5
(43)
In order to determine which IDPS best meets an organization's needs,first consider the organizational environment in technical,physical,and political terms.
(True/False)
4.8/5
(33)
A(n)NIDPS functions on the host system,where encrypted traffic will have been decrypted and is available for processing._________________________
(True/False)
5.0/5
(30)
____ is the process of classifying IDPS alerts so that they can be more effectively managed.
(Multiple Choice)
4.8/5
(38)
A false positive is the failure of an IDPS system to react to an actual attack event.
(True/False)
4.9/5
(39)
Intrusion detection and prevention systems can deal effectively with switched networks.
(True/False)
4.9/5
(42)
The Simple Network Management Protocol contains trap functions,which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed,either positively or negatively.
(True/False)
4.9/5
(48)
Showing 81 - 100 of 108
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)