Filters
Question type

Study Flashcards

An HIDPS can monitor system logs for predefined events.

Correct Answer

verifed

verified

Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.

Correct Answer

verifed

verified

A(n) ____________________ system contains pseudo-services that emulate well-known services, but is configured in ways that make it look vulnerable to attacks.

Correct Answer

verifed

verified

The ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks is called ____________________.

Correct Answer

verifed

verified

noise

A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

Correct Answer

verifed

verified

__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.


A)  NIDPSs
B)  HIDPSs 
C)  AppIDPSs
D)  SIDPSs

Correct Answer

verifed

verified

B

A padded cell is a hardened honeynet. _________________________

Correct Answer

verifed

verified

A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.


A)  packet scanner
B)  packet sniffer 
C)  honeypot
D)  honey packet

Correct Answer

verifed

verified

The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.

Correct Answer

verifed

verified

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

Correct Answer

verifed

verified

Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker's system to find out as much as possible about the hacker.

Correct Answer

verifed

verified

The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.

Correct Answer

verifed

verified

List and describe at least four reasons to acquire and use an IDPS.

Correct Answer

verifed

verified

1. To prevent problem behaviors by incre...

View Answer

A(n) ____________________ vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

Correct Answer

verifed

verified

__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.


A)  NIDPSs
B)  HIDPSs 
C)  AppIDPSs
D)  SIDPSs

Correct Answer

verifed

verified

A(n) ____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.

Correct Answer

verifed

verified

To use a packet sniffer legally, the administrator must __________.


A)  be on a network that the organization owns
B)  be under direct authorization of the network's owners 
C)  have knowledge and consent of the content's creators
D)  All of the above

Correct Answer

verifed

verified

Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.

Correct Answer

verifed

verified

To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.

Correct Answer

verifed

verified

The attack ____________________ is a series of steps or processes used by an attacker, in a logical sequence, to launch an attack against a target system or network.

Correct Answer

verifed

verified

protocol

Showing 1 - 20 of 107

Related Exams

Show Answer