Exam 8: Intrusion Detection
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The broad classes of intruders are: cyber criminals, state-sponsored organizations, _________ , and others.
Free
(Short Answer)
4.9/5
(38)
Correct Answer:
activists
An inline sensor monitors a copy of network traffic; the actual trafficdoes not pass through the device.
Free
(True/False)
4.8/5
(35)
Correct Answer:
False
Snort can perform intrusion prevention but not intrusion detection.
Free
(True/False)
4.9/5
(41)
Correct Answer:
False
__________ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner.
(Short Answer)
4.9/5
(34)
Those who hack into computers do so for the thrill of it or for status.
(True/False)
4.8/5
(32)
Signature-based approaches attempt to define normal, or expected,behavior, whereas anomaly approaches attempt to define proper behavior.
(True/False)
4.7/5
(30)
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
(Multiple Choice)
4.8/5
(42)
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
(Multiple Choice)
4.7/5
(24)
________ are decoy systems that are designed to lure a potential attacker away from critical systems.
(Short Answer)
4.8/5
(32)
The primary purpose of an IDS is to detect intrusions, log suspiciousevents, and send alerts.
(True/False)
4.9/5
(33)
Intrusion detection is based on the assumption that the behavior of theintruder differs from that of a legitimate user in ways that can be quantified.
(True/False)
4.9/5
(25)
Network-based intrusion detection makes use of signature detectionand anomaly detection.
(True/False)
4.8/5
(34)
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
(Multiple Choice)
4.8/5
(37)
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
(True/False)
4.9/5
(34)
The IDS component responsible for collecting data is the user interface.
(True/False)
4.7/5
(37)
_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.
(Multiple Choice)
4.9/5
(29)
The _________ module analyzes LAN traffic and reports the results to the central manager.
(Multiple Choice)
4.8/5
(43)
A(n) ________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.
(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)