Exam 8: Intrusion Detection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The broad classes of intruders are: cyber criminals, state-sponsored organizations, _________ , and others.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

activists

An inline sensor monitors a copy of network traffic; the actual trafficdoes not pass through the device.

Free
(True/False)
4.8/5
(35)
Correct Answer:
Verified

False

Snort can perform intrusion prevention but not intrusion detection.

Free
(True/False)
4.9/5
(41)
Correct Answer:
Verified

False

__________ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner.

(Short Answer)
4.9/5
(34)

Those who hack into computers do so for the thrill of it or for status.

(True/False)
4.8/5
(32)

Signature-based approaches attempt to define normal, or expected,behavior, whereas anomaly approaches attempt to define proper behavior.

(True/False)
4.7/5
(30)

_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

(Multiple Choice)
4.8/5
(42)

A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

(Multiple Choice)
4.7/5
(24)

Intruders typically use steps from a common attack methodology.

(True/False)
4.8/5
(34)

________ are decoy systems that are designed to lure a potential attacker away from critical systems.

(Short Answer)
4.8/5
(32)

The primary purpose of an IDS is to detect intrusions, log suspiciousevents, and send alerts.

(True/False)
4.9/5
(33)

Intrusion detection is based on the assumption that the behavior of theintruder differs from that of a legitimate user in ways that can be quantified.

(True/False)
4.9/5
(25)

Network-based intrusion detection makes use of signature detectionand anomaly detection.

(True/False)
4.8/5
(34)

The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.

(Multiple Choice)
4.8/5
(37)

Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.

(True/False)
4.9/5
(34)

The IDS component responsible for collecting data is the user interface.

(True/False)
4.7/5
(37)

_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.

(Multiple Choice)
4.9/5
(29)

The _________ module analyzes LAN traffic and reports the results to the central manager.

(Multiple Choice)
4.8/5
(43)

An intruder can also be referred to as a hacker or cracker.

(True/False)
4.9/5
(36)

A(n) ________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)