Exam 13: Intrusion Detection Systems and Network Security
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Content-based signatures detect character patterns and TCP flag settings.
(True/False)
4.8/5
(43)
A sniffer must use a NIC in promiscuous mode;otherwise it will not see all the network traffic coming into the NIC.
(True/False)
4.7/5
(28)
The misuse detection IDS model is more difficult to implement than the anomaly detection model,and is not as popular as a result.
(True/False)
4.8/5
(26)
What device would you use to attract potential attacks,so that you could safely monitor the activity and discover the intentions of the attacker?
(Multiple Choice)
4.9/5
(37)
Your boss is concerned about employees viewing in appropriate or illegal web sites in the workplace.Which device would be the best at addressing this concern?
(Multiple Choice)
4.8/5
(32)
The nuisance of web pages that automatically appear on top of your current web page can be remedied with
(Multiple Choice)
4.9/5
(32)
A signature database contains a list of the contents of the IP packet header's signature block,for every type of packet the IDS monitors.
(True/False)
4.9/5
(44)
Showing 41 - 49 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)