Filters
Question type

Study Flashcards

MATCHING -a genuine attack detected successfully by an IDPS


A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive

Correct Answer

verifed

verified

Describe two advantages and two disadvantages of a signature-based system.

Correct Answer

verifed

verified

Advantages:
This approach makes use of s...

View Answer

Which of the following is an advantage of a signature-based detection system?


A) the definition of what constitutes normal traffic changes
B) it is based on profiles the administrator creates
C) each signature is assigned a number and name
D) the IDPS must be trained for weeks

Correct Answer

verifed

verified

Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.

Correct Answer

verifed

verified

A network ____________ is a type of passive sensor that consists of a direct connection between a sensor and the physical network medium.

Correct Answer

verifed

verified

MATCHING -an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through


A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive

Correct Answer

verifed

verified

A weakness of a signature-based system is that it must keep state information on a possible attack.

Correct Answer

verifed

verified

Which of the following is true about an NIDPS versus an HIDPS?


A) an NIDPS can determine if a host attack was successful
B) an HIDPS can detect attacks not caught by an NIDPS
C) an HIDPS can detect intrusion attempts on the entire network
D) an NIDPS can compare audit log records

Correct Answer

verifed

verified

Where is a host-based IDPS agent typically placed?


A) on a workstation or server
B) at Internet gateways
C) between remote users and internal network
D) between two subnets

Correct Answer

verifed

verified

MATCHING -sets of characteristics that describe network services and resources a user or group normally accesses


A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive

Correct Answer

verifed

verified

Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?


A) passive only
B) inline only
C) active only
D) online only

Correct Answer

verifed

verified

List four types of information that an NIDPS typically logs.

Correct Answer

verifed

verified

Timestamps
Event or alert types
Protocol...

View Answer

Which of the following is true about an HIDPS?


A) monitors OS and application logs
B) sniffs packets as they enter the network
C) tracks misuse by external users
D) centralized configurations affect host performance

Correct Answer

verifed

verified

Describe two advantages and two disadvantages of an anomaly-based system.

Correct Answer

verifed

verified

Advantages:
Because an anomaly detection...

View Answer

No actual traffic passes through a passive sensor; it only monitors copies of the traffic.

Correct Answer

verifed

verified

Which of the following is an IDPS security best practice?


A) to prevent false positives, only test the IDPS at initial configuration
B) communication between IDPS components should be encrypted
C) all sensors should be assigned IP addresses
D) log files for HIDPSs should be kept local

Correct Answer

verifed

verified

MATCHING -increasing an intrusion response to a higher level


A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive

Correct Answer

verifed

verified

List two approaches to stateful protocol analysis.

Correct Answer

verifed

verified

Traffic rate monitoring
Protoc...

View Answer

Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?


A) inline
B) host-based
C) hybrid
D) network-based

Correct Answer

verifed

verified

Which of the following is NOT a primary detection methodology?


A) signature detection
B) baseline detection
C) anomaly detection
D) stateful protocol analysis

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer