Exam 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____________________ error rate is the level at which the number of false rejections equals the false acceptances,also known as the equal error rate.

(Essay)
4.9/5
(30)

____ is based on the use of some measurable human characteristic or trait to authenticate the identity of a proposed systems user.

(Multiple Choice)
4.9/5
(28)

____________________ scanning will allow the Nmap user to bounce your scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.

(Short Answer)
4.8/5
(37)

An HIDPS can detect local events on host systems and also detect attacks that may elude a network-based IDPS.

(True/False)
4.8/5
(40)

____ benchmark and monitor the status of key system files and detect when an intruder creates,modifies,or deletes monitored files.

(Multiple Choice)
4.8/5
(32)

Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.

(True/False)
4.8/5
(31)

In the process of protocol application verification,the NIDPSs look for invalid data packets._________________________

(True/False)
4.8/5
(34)

Using ____,the system reviews the log files generated by servers,network devices,and even other IDPSs.

(Multiple Choice)
4.8/5
(32)
Showing 101 - 108 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)