Exam 8: Intrusion Detection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The broad classes of intruders are: cyber criminals,state-sponsored organizations,_________ ,and others.

(Essay)
4.7/5
(39)

The _________ (RFC 4766)document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).

(Essay)
4.8/5
(33)

The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.

(Multiple Choice)
4.8/5
(34)

Those who hack into computers do so for the thrill of it or for status.

(True/False)
4.7/5
(32)

A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

(Multiple Choice)
4.8/5
(33)

The ________ is responsible for determining if an intrusion has occurred.

(Multiple Choice)
4.7/5
(41)

A common location for a NIDS sensor is just inside the external firewall.

(True/False)
4.9/5
(40)

The IDS component responsible for collecting data is the user interface.

(True/False)
4.7/5
(40)

Intruders typically use steps from a common attack methodology.

(True/False)
4.8/5
(30)

_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

(Multiple Choice)
4.9/5
(35)

Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.

(True/False)
4.8/5
(35)

Copying a database containing credit card numbers,viewing sensitive data without authorization,and guessing and cracking passwords are examples of _________ .

(Essay)
4.8/5
(43)

A (n)__________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.

(Multiple Choice)
4.8/5
(36)

Signature-based approaches attempt to define normal,or expected, behavior,whereas anomaly approaches attempt to define proper behavior.

(True/False)
4.9/5
(40)

A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities.

(Essay)
4.7/5
(29)

An IDS comprises three logical components: analyzers,user interface and _____.

(Essay)
4.8/5
(39)

The primary purpose of an IDS is to detect intrusions,log suspicious events,and send alerts.

(True/False)
4.9/5
(33)

A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

(Multiple Choice)
4.8/5
(40)

The _________ module analyzes LAN traffic and reports the results to the central manager.

(Multiple Choice)
4.9/5
(33)

A ________ monitors network traffic for particular network segments or devices and analyzes network,transport,and application protocols to identify suspicious activity.

(Multiple Choice)
4.7/5
(39)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)