Deck 8: Intrusion Detection
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 8: Intrusion Detection
1
To be of practical use an IDS should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.
intrusions while keeping the false alarm rate at an acceptable level.
True
2
The IDS component responsible for collecting data is the user interface.
False
3
Those who hack into computers do so for the thrill of it or for status.
True
4
Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
intruder differs from that of a legitimate user in ways that can be quantified.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The ________ is responsible for determining if an intrusion has occurred.
A)analyzer
B)host
C)user interface
D)sensor
A)analyzer
B)host
C)user interface
D)sensor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Snort can perform intrusion prevention but not intrusion detection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
An inline sensor monitors a copy of network traffic;the actual traffic
does not pass through the device.
does not pass through the device.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
_________ are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes.
A)State-sponsored organizations
B)Activists
C)Cyber criminals
D)Others
A)State-sponsored organizations
B)Activists
C)Cyber criminals
D)Others
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Network-based intrusion detection makes use of signature detection
and anomaly detection.
and anomaly detection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Signature-based approaches attempt to define normal,or expected,
behavior,whereas anomaly approaches attempt to define proper behavior.
behavior,whereas anomaly approaches attempt to define proper behavior.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Intruders typically use steps from a common attack methodology.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
Anomaly detection is effective against misfeasors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Activists are either individuals or members of an organized crime
group with a goal of financial reward.
group with a goal of financial reward.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
An intruder can also be referred to as a hacker or cracker.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The primary purpose of an IDS is to detect intrusions,log suspicious
events,and send alerts.
events,and send alerts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
A ________ monitors network traffic for particular network segments or devices and analyzes network,transport,and application protocols to identify suspicious activity.
A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.
A)intrusion detection
B)IDS
C)criminal enterprise
D)security intrusion
A)intrusion detection
B)IDS
C)criminal enterprise
D)security intrusion
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
A common location for a NIDS sensor is just inside the external
firewall.
firewall.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A(n)________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way.
A)PEP
B)DDI
C)IDEP
D)IDME
A)PEP
B)DDI
C)IDEP
D)IDME
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
_________ simulate human brain operation with neurons and synapse between them that classify observed data
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The broad classes of intruders are: cyber criminals,state-sponsored organizations,_________ ,and others.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.
A)protocol
B)direction
C)action
D)destination port
A)protocol
B)direction
C)action
D)destination port
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
A)data source
B)sensor
C)operator
D)analyzer
A)data source
B)sensor
C)operator
D)analyzer
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is a security service that monitors and analyzes system events for the purpose of finding,and providing real-time warning of attempts to access system resources in an unauthorized manner.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The _________ to an IDS enables a user to view output from the system or control the behavior of the system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Copying a database containing credit card numbers,viewing sensitive data without authorization,and guessing and cracking passwords are examples of _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
A)central manager agent
B)LAN monitor agent
C)host agent
D)architecture agent
A)central manager agent
B)LAN monitor agent
C)host agent
D)architecture agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A ________ is a hacker with sufficient technical skills to modify and extend attack toolkits to use newly discovered vulnerabilities.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A (n)__________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.
A)Master
B)Apprentice
C)Journeyman
D)Activist
A)Master
B)Apprentice
C)Journeyman
D)Activist
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
_________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
An IDS comprises three logical components: analyzers,user interface and _____.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The _________ module analyzes LAN traffic and reports the results to the central manager.
A)LAN monitor agent
B)host agent
C)central manager agent
D)architecture agent
A)LAN monitor agent
B)host agent
C)central manager agent
D)architecture agent
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.
A)RFC 4767
B)RFC 4766
C)RFC 4765
D)RFC 4764
A)RFC 4767
B)RFC 4766
C)RFC 4765
D)RFC 4764
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
A(n)________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.
A)passive sensor
B)analysis sensor
C)LAN sensor
D)inline sensor
A)passive sensor
B)analysis sensor
C)LAN sensor
D)inline sensor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The functional components of an _________ are: data source,sensor,analyzer,administration,manager,and operator.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The _________ (RFC 4766)document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
________ are decoy systems that are designed to lure a potential attacker away from critical systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The __________ is the human with overall responsibility for setting the security policy of the organization,and,thus,for decisions about deploying and configuring the IDS.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck