Exam 13: Intrusion Detection Systems and Network Security
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Deploying,maintaining,and upgrading host-based IDSs in a large network is cheaper than NIDSs.
Free
(True/False)
4.8/5
(29)
Correct Answer:
False
Network-based IDS examines activity on a system such,as a mail server or web server.
(True/False)
4.7/5
(29)
According to SANS Internet Storm Center,the average survival time of an unpatched Windows PC on the Internet is
(Multiple Choice)
4.7/5
(33)
Only active intrusion detection systems (IDS)can aggressively respond to suspicious activity,whereas passive IDS cannot.
(True/False)
4.8/5
(30)
A(n)_______________ server can be used to filter out undesirable traffic and prevent employees from accessing potentially hostile web sites.
(Short Answer)
4.9/5
(33)
Which of the following is NOT an advantage of network-based IDS?
(Multiple Choice)
4.9/5
(40)
Hostile activity that does not match an IDS signature and goes undetected is called a false positive.
(True/False)
4.9/5
(24)
Simple rule sets that are applied to port number and IP addresses are called
(Multiple Choice)
4.9/5
(40)
A new breed of IDS that is designed to identify and prevent malicious activity from harming a system.
(Multiple Choice)
4.9/5
(26)
The NIDS signature database is usually much larger than that of a host-based system.
(True/False)
5.0/5
(31)
List three approaches that antispam software uses to filter out junk e-mail.
(Essay)
4.9/5
(27)
_______________ detection looks for things that are out of the ordinary,such as a user logging in when he's not supposed to,or unusually high network traffic into and out of a workstation.
(Short Answer)
4.8/5
(35)
_______________ signatures are designed to match large patterns of activity,and examine how certain types of activity fit into the other activities going on around them.
(Short Answer)
4.8/5
(33)
How does stateful packet filtering differ from basic packet filtering?
(Multiple Choice)
4.8/5
(35)
The model that most modern intrusion detection systems use is largely based upon a model created by Dorothy Denning and Peter Neumann called:
(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)