Exam 8: Intrusion Detection
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
(Multiple Choice)
4.7/5
(38)
A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way.
(Multiple Choice)
4.7/5
(28)
The ________ is responsible for determining if an intrusion has occurred.
(Multiple Choice)
4.8/5
(33)
To be of practical use an IDS should detect a substantial percentage ofintrusions while keeping the false alarm rate at an acceptable level.
(True/False)
4.8/5
(40)
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
(Short Answer)
4.7/5
(43)
Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of _________ .
(Short Answer)
4.9/5
(48)
A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
(Multiple Choice)
4.7/5
(33)
The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.
(Multiple Choice)
4.8/5
(31)
A (n) __________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.
(Multiple Choice)
4.8/5
(40)
A common location for a NIDS sensor is just inside the externalfirewall.
(True/False)
4.7/5
(26)
The __________ is the human with overall responsibility for setting the security policy of the organization, and, thus, for decisions about deploying and configuring the IDS.
(Short Answer)
4.8/5
(38)
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
(Short Answer)
4.8/5
(38)
A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities.
(Short Answer)
4.7/5
(30)
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
(Multiple Choice)
4.9/5
(40)
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
(Short Answer)
4.8/5
(31)
_________ simulate human brain operation with neurons and synapse between them that classify observed data
(Short Answer)
4.7/5
(30)
Activists are either individuals or members of an organized crimegroup with a goal of financial reward.
(True/False)
4.9/5
(29)
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.
(Multiple Choice)
4.7/5
(31)
The _________ (RFC 4766) document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
(Essay)
4.9/5
(40)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)