Exam 13: Intrusion Detection Systems and Network Security
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
A(n)_______________ is an artificial environment where attackers can be contained and observed,without putting real systems at risk.
(Short Answer)
4.8/5
(41)
A(n)_______________ monitors network traffic for malicious or unwanted behavior and can block,reject,or redirect traffic in real time.
(Short Answer)
4.8/5
(32)
Which component of an IDS examines the collected network traffic and compares it to known patterns of suspicious or malicious activity?
(Multiple Choice)
4.8/5
(31)
A(n)_______________ is a network device with the purpose of enforcing a security policy across its connection,by allowing or denying traffic to pass into or out of the network.
(Short Answer)
4.9/5
(32)
A(n)_______________ is also known as a packet sniffer and network sniffer.
(Short Answer)
4.8/5
(34)
What must you do in order to sniff the traffic on all ports on a switch?
(Multiple Choice)
4.9/5
(34)
Your boss would like you to implement a network device that will monitor traffic and turn off processes and reconfigure permissions as necessary.To do this you would use
(Multiple Choice)
4.9/5
(35)
_______________ scanning typically looks for commands or instructions that are not normally found in application programs,such as attempts to access a reserved memory register.
(Short Answer)
5.0/5
(39)
Which of the following is NOT a disadvantage of host-based IDS?
(Multiple Choice)
4.9/5
(26)
While NIDS are able to detect activities such as port scans and brute force attacks,it is unable to detect tunneling.
(True/False)
4.8/5
(41)
The security tool that will hide information about the requesting system and make the browsing experience secret is a
(Multiple Choice)
4.7/5
(31)
_______________ are host-based protective mechanisms that monitor and control traffic passing into and out of a single system.
(Short Answer)
4.9/5
(39)
Showing 21 - 40 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)