Exam 8: Intrusion Detection
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software44 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow44 Questions
Exam 11: Software Security43 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Trusted Computing and Multilevel Security45 Questions
Exam 14: It Security Management and Risk Assessment45 Questions
Exam 15: It Security Controls,plans,and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The broad classes of intruders are: cyber criminals,state-sponsored organizations,_________ ,and others.
(Essay)
4.7/5
(39)
The _________ (RFC 4766)document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
(Essay)
4.8/5
(33)
The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.
(Multiple Choice)
4.8/5
(34)
Those who hack into computers do so for the thrill of it or for status.
(True/False)
4.7/5
(32)
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.
(Multiple Choice)
4.8/5
(33)
The ________ is responsible for determining if an intrusion has occurred.
(Multiple Choice)
4.7/5
(41)
A common location for a NIDS sensor is just inside the external
firewall.
(True/False)
4.9/5
(40)
The IDS component responsible for collecting data is the user interface.
(True/False)
4.7/5
(40)
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
(Multiple Choice)
4.9/5
(35)
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
(True/False)
4.8/5
(35)
Copying a database containing credit card numbers,viewing sensitive data without authorization,and guessing and cracking passwords are examples of _________ .
(Essay)
4.8/5
(43)
A (n)__________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.
(Multiple Choice)
4.8/5
(36)
Signature-based approaches attempt to define normal,or expected,
behavior,whereas anomaly approaches attempt to define proper behavior.
(True/False)
4.9/5
(40)
A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities.
(Essay)
4.7/5
(29)
An IDS comprises three logical components: analyzers,user interface and _____.
(Essay)
4.8/5
(39)
The primary purpose of an IDS is to detect intrusions,log suspicious
events,and send alerts.
(True/False)
4.9/5
(33)
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
(Multiple Choice)
4.8/5
(40)
The _________ module analyzes LAN traffic and reports the results to the central manager.
(Multiple Choice)
4.9/5
(33)
A ________ monitors network traffic for particular network segments or devices and analyzes network,transport,and application protocols to identify suspicious activity.
(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)