Exam 8: Intrusion Detection
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
Free
(Essay)
4.8/5
(23)
Correct Answer:
Signature
The _________ to an IDS enables a user to view output from the system or control the behavior of the system.
Free
(Essay)
4.9/5
(23)
Correct Answer:
user interface
__________ is a security service that monitors and analyzes system events for the purpose of finding,and providing real-time warning of attempts to access system resources in an unauthorized manner.
Free
(Essay)
4.9/5
(28)
Correct Answer:
Intrusion Detection
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
(Essay)
4.8/5
(34)
Network-based intrusion detection makes use of signature detection
and anomaly detection.
(True/False)
4.9/5
(34)
_________ simulate human brain operation with neurons and synapse between them that classify observed data
(Essay)
4.9/5
(38)
Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
(True/False)
4.9/5
(32)
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
(Essay)
4.8/5
(26)
_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.
(Multiple Choice)
4.8/5
(39)
_________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
(Essay)
4.8/5
(35)
To be of practical use an IDS should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.
(True/False)
4.7/5
(40)
Activists are either individuals or members of an organized crime
group with a goal of financial reward.
(True/False)
4.9/5
(40)
A(n)________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.
(Multiple Choice)
4.8/5
(32)
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
(Multiple Choice)
4.8/5
(33)
The functional components of an _________ are: data source,sensor,analyzer,administration,manager,and operator.
(Essay)
4.8/5
(37)
An inline sensor monitors a copy of network traffic;the actual traffic
does not pass through the device.
(True/False)
4.9/5
(31)
________ are decoy systems that are designed to lure a potential attacker away from critical systems.
(Essay)
4.8/5
(40)
The __________ is the human with overall responsibility for setting the security policy of the organization,and,thus,for decisions about deploying and configuring the IDS.
(Essay)
4.7/5
(30)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)