Exam 8: Intrusion Detection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The IDS component responsible for collecting data is the user interface.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

False

_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Snort can perform intrusion prevention but not intrusion detection.

Free
(True/False)
4.9/5
(32)
Correct Answer:
Verified

False

A ________ model is used to establish transition probabilities among various states.

(Multiple Choice)
4.8/5
(29)

_________ are cooperative ventures that collect information about system vulnerabilities and disseminate it to systems mangers.

(Short Answer)
4.9/5
(37)

A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

(Multiple Choice)
4.9/5
(33)

The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.

(Multiple Choice)
4.7/5
(25)

A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

(Multiple Choice)
4.8/5
(37)

________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.

(Short Answer)
4.9/5
(35)

A distributed IDS consists of three main components: host agent module,central manager module,and ___________ module.

(Short Answer)
4.9/5
(41)

Network-based intrusion detection makes use of signature detection and anomaly detection.

(True/False)
4.8/5
(30)

The three classes of intruders are masquerader,clandestine user and _________.

(Short Answer)
4.8/5
(34)

__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.

(Multiple Choice)
4.8/5
(41)

Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.

(True/False)
4.9/5
(28)

A(n)________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.

(Multiple Choice)
4.9/5
(29)

The ________ is responsible for determining if an intrusion has occurred.

(Multiple Choice)
4.8/5
(38)

The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.

(Short Answer)
4.9/5
(40)

An intruder can also be referred to as a hacker or cracker.

(True/False)
4.7/5
(41)

_________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.

(Short Answer)
4.9/5
(39)

A ________ is a legitimate user who accesses data,programs,or resources for which such access is not authorized,or who is authorized for such access but misuses his or her privileges.

(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)