Exam 13: Intrusion Detection Systems and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n)_______________ is an artificial environment where attackers can be contained and observed,without putting real systems at risk.

(Short Answer)
4.8/5
(41)

A(n)_______________ monitors network traffic for malicious or unwanted behavior and can block,reject,or redirect traffic in real time.

(Short Answer)
4.8/5
(32)

Which component of an IDS examines the collected network traffic and compares it to known patterns of suspicious or malicious activity?

(Multiple Choice)
4.8/5
(31)

A(n)_______________ is a network device with the purpose of enforcing a security policy across its connection,by allowing or denying traffic to pass into or out of the network.

(Short Answer)
4.9/5
(32)

Zone Alarm,Windows ICF,and iptables are all examples of

(Multiple Choice)
4.8/5
(45)

A(n)_______________ is also known as a packet sniffer and network sniffer.

(Short Answer)
4.8/5
(34)

What are the advantages and disadvantages of HIDSs?

(Essay)
4.7/5
(22)

What must you do in order to sniff the traffic on all ports on a switch?

(Multiple Choice)
4.9/5
(34)

Your boss would like you to implement a network device that will monitor traffic and turn off processes and reconfigure permissions as necessary.To do this you would use

(Multiple Choice)
4.9/5
(35)

_______________ scanning typically looks for commands or instructions that are not normally found in application programs,such as attempts to access a reserved memory register.

(Short Answer)
5.0/5
(39)

The main purpose of a honeypot is

(Multiple Choice)
4.8/5
(33)

Which of the following is NOT a disadvantage of host-based IDS?

(Multiple Choice)
4.9/5
(26)

While NIDS are able to detect activities such as port scans and brute force attacks,it is unable to detect tunneling.

(True/False)
4.8/5
(41)

The security tool that will hide information about the requesting system and make the browsing experience secret is a

(Multiple Choice)
4.7/5
(31)

How does IPS differ from an IDS?

(Multiple Choice)
4.8/5
(31)

What was wrong with the first host-based IDSs?

(Essay)
4.9/5
(42)

The difference between misuse and anomaly IDS models is

(Multiple Choice)
4.9/5
(34)

_______________ are host-based protective mechanisms that monitor and control traffic passing into and out of a single system.

(Short Answer)
4.9/5
(39)

Egress filtering

(Multiple Choice)
4.8/5
(36)

_______________ products filter out the junk e-mail.

(Short Answer)
4.9/5
(40)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)