Exam 8: Intrusion Detection
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication44 Questions
Exam 4: Access Control45 Questions
Exam 5: Database Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls, plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The IDS component responsible for collecting data is the user interface.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
Snort can perform intrusion prevention but not intrusion detection.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
A ________ model is used to establish transition probabilities among various states.
(Multiple Choice)
4.8/5
(29)
_________ are cooperative ventures that collect information about system vulnerabilities and disseminate it to systems mangers.
(Short Answer)
4.9/5
(37)
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
(Multiple Choice)
4.9/5
(33)
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
(Multiple Choice)
4.7/5
(25)
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.
(Multiple Choice)
4.8/5
(37)
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
(Short Answer)
4.9/5
(35)
A distributed IDS consists of three main components: host agent module,central manager module,and ___________ module.
(Short Answer)
4.9/5
(41)
Network-based intrusion detection makes use of signature detection
and anomaly detection.
(True/False)
4.8/5
(30)
The three classes of intruders are masquerader,clandestine user and _________.
(Short Answer)
4.8/5
(34)
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
(Multiple Choice)
4.8/5
(41)
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
(True/False)
4.9/5
(28)
A(n)________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.
(Multiple Choice)
4.9/5
(29)
The ________ is responsible for determining if an intrusion has occurred.
(Multiple Choice)
4.8/5
(38)
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
(Short Answer)
4.9/5
(40)
_________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
(Short Answer)
4.9/5
(39)
A ________ is a legitimate user who accesses data,programs,or resources for which such access is not authorized,or who is authorized for such access but misuses his or her privileges.
(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)