Exam 13: Intrusion Detection Systems and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What does a host-based IDS monitor?

Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
Verified

A

Deploying,maintaining,and upgrading host-based IDSs in a large network is cheaper than NIDSs.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

False

One of the advantages of HIDS is that

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

A

Network-based IDS examines activity on a system such,as a mail server or web server.

(True/False)
4.7/5
(29)

According to SANS Internet Storm Center,the average survival time of an unpatched Windows PC on the Internet is

(Multiple Choice)
4.7/5
(33)

What are content- and context-based signatures?

(Essay)
4.8/5
(36)

Only active intrusion detection systems (IDS)can aggressively respond to suspicious activity,whereas passive IDS cannot.

(True/False)
4.8/5
(30)

A(n)_______________ server can be used to filter out undesirable traffic and prevent employees from accessing potentially hostile web sites.

(Short Answer)
4.9/5
(33)

Which of the following is NOT an advantage of network-based IDS?

(Multiple Choice)
4.9/5
(40)

Antivirus products do all of the following EXCEPT:

(Multiple Choice)
4.8/5
(41)

Hostile activity that does not match an IDS signature and goes undetected is called a false positive.

(True/False)
4.9/5
(24)

Simple rule sets that are applied to port number and IP addresses are called

(Multiple Choice)
4.9/5
(40)

Which of the following is NOT a component of an IDS?

(Multiple Choice)
4.7/5
(37)

A new breed of IDS that is designed to identify and prevent malicious activity from harming a system.

(Multiple Choice)
4.9/5
(26)

The NIDS signature database is usually much larger than that of a host-based system.

(True/False)
5.0/5
(31)

List three approaches that antispam software uses to filter out junk e-mail.

(Essay)
4.9/5
(27)

_______________ detection looks for things that are out of the ordinary,such as a user logging in when he's not supposed to,or unusually high network traffic into and out of a workstation.

(Short Answer)
4.8/5
(35)

_______________ signatures are designed to match large patterns of activity,and examine how certain types of activity fit into the other activities going on around them.

(Short Answer)
4.8/5
(33)

How does stateful packet filtering differ from basic packet filtering?

(Multiple Choice)
4.8/5
(35)

The model that most modern intrusion detection systems use is largely based upon a model created by Dorothy Denning and Peter Neumann called:

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)