A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) the definition of what constitutes normal traffic changes
B) it is based on profiles the administrator creates
C) each signature is assigned a number and name
D) the IDPS must be trained for weeks
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) an NIDPS can determine if a host attack was successful
B) an HIDPS can detect attacks not caught by an NIDPS
C) an HIDPS can detect intrusion attempts on the entire network
D) an NIDPS can compare audit log records
Correct Answer
verified
Multiple Choice
A) on a workstation or server
B) at Internet gateways
C) between remote users and internal network
D) between two subnets
Correct Answer
verified
Multiple Choice
A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive
Correct Answer
verified
Multiple Choice
A) passive only
B) inline only
C) active only
D) online only
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) monitors OS and application logs
B) sniffs packets as they enter the network
C) tracks misuse by external users
D) centralized configurations affect host performance
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) to prevent false positives, only test the IDPS at initial configuration
B) communication between IDPS components should be encrypted
C) all sensors should be assigned IP addresses
D) log files for HIDPSs should be kept local
Correct Answer
verified
Multiple Choice
A) accountability
B) escalated
C) event horizon
D) inline sensor
E) intrusion
F) passive sensor
G) profiles
H) sensor
I) stateful protocol analysis
J) true positive
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) inline
B) host-based
C) hybrid
D) network-based
Correct Answer
verified
Multiple Choice
A) signature detection
B) baseline detection
C) anomaly detection
D) stateful protocol analysis
Correct Answer
verified
Showing 21 - 40 of 50
Related Exams