Filters
Question type

A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________

Correct Answer

verifed

verified

__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.


A) Honeynet
B) Trap-and-trace
C) HIDPS
D) Packet sniffer

Correct Answer

verifed

verified

An HIDPS can monitor system logs for predefined events.

Correct Answer

verifed

verified

A(n) __________ is an event that triggers an alarm when no actual attack is in progress.


A) false neutral
Attack stimulus
C) false negative
D) noise

Correct Answer

verifed

verified

An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.

Correct Answer

verifed

verified

A(n) ____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.

Correct Answer

verifed

verified

The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.

Correct Answer

verifed

verified

The ability to detect a target computer's __________ is very valuable to an attacker.


A) manufacturer
B) operating system
C) peripherals
D) BIOS

Correct Answer

verifed

verified

A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________

Correct Answer

verifed

verified

A(n) log file monitor is similar to an NIDPS. _________________________

Correct Answer

verifed

verified

IDPSs can help the organization protect its assets when its networks and systems are exposed to ____________________ vulnerabilities or are unable to respond to a rapidly changing threat environment.

Correct Answer

verifed

verified

A packet ____________________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

Correct Answer

verifed

verified

A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.


A) IDPS
B) WiFi
C) UDP
D) DoS

Correct Answer

verifed

verified

To detect attacks and other security violations that are not prevented by other security measures

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

To detect attacks and other security vio...

View Answer

The ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks is called ____________________.

Correct Answer

verifed

verified

A(n) ____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.

Correct Answer

verifed

verified

A signature-based IDPS is sometimes called a(n) ____________________-based IDPS.

Correct Answer

verifed

verified

__________ is the process of classifying IDPS alerts so that they can be more effectively managed.


A) Alarm filtering
B) Alarm clustering
C) Alarm compaction
D) Alarm attenuation

Correct Answer

verifed

verified

Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.


A) passive
B) active
C) reactive
D) dynamic

Correct Answer

verifed

verified

Alarm ____________________ and compaction is a consolidation of almost identical alarms that happen at close to the same time into a single higher-level alarm.

Correct Answer

verifed

verified

Showing 41 - 60 of 121

Related Exams

Show Answer