Exam 13: Intrusion Detection Systems and Network Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Antispam does all of the following EXCEPT:

(Multiple Choice)
4.9/5
(30)

Windows Defender does all of the following EXCEPT:

(Multiple Choice)
4.7/5
(30)

Content-based signatures detect character patterns and TCP flag settings.

(True/False)
4.8/5
(43)

A sniffer must use a NIC in promiscuous mode;otherwise it will not see all the network traffic coming into the NIC.

(True/False)
4.7/5
(28)

The misuse detection IDS model is more difficult to implement than the anomaly detection model,and is not as popular as a result.

(True/False)
4.8/5
(26)

What device would you use to attract potential attacks,so that you could safely monitor the activity and discover the intentions of the attacker?

(Multiple Choice)
4.9/5
(37)

Your boss is concerned about employees viewing in appropriate or illegal web sites in the workplace.Which device would be the best at addressing this concern?

(Multiple Choice)
4.8/5
(32)

The nuisance of web pages that automatically appear on top of your current web page can be remedied with

(Multiple Choice)
4.9/5
(32)

A signature database contains a list of the contents of the IP packet header's signature block,for every type of packet the IDS monitors.

(True/False)
4.9/5
(44)
Showing 41 - 49 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)