Filters
Question type

Study Flashcards

A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________

Correct Answer

verifed

verified

The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.

Correct Answer

verifed

verified

List and describe the three advantages of NIDPSs.

Correct Answer

verifed

verified

1. Good network design and placement of ...

View Answer

Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.


A)  inline
B)  offline 
C)  passive
D)  bypass

Correct Answer

verifed

verified

NIDPSs can reliably ascertain whether an attack was successful.

Correct Answer

verifed

verified

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) ____________________.

Correct Answer

verifed

verified

Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.


A)  prevention
B)  reaction 
C)  detection
D)  correction

Correct Answer

verifed

verified

A(n) __________ IDPS is focused on protecting network information assets.


A)  network-based
B)  host-based 
C)  application-based
D)  server-based

Correct Answer

verifed

verified

Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________

Correct Answer

verifed

verified

To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.


A)  vulnerabilities
B)  fingerprints 
C)  signatures
D)  footprints

Correct Answer

verifed

verified

A false positive is the failure of an IDPS system to react to an actual attack event.

Correct Answer

verifed

verified

The primary advantages of a centralized IDPS control strategy are cost and ease of use. _________________________

Correct Answer

verifed

verified

Preconfigured, predetermined attack patterns are called signatures. _________________________

Correct Answer

verifed

verified

For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________

Correct Answer

verifed

verified

____________________ is the process of attracting attention to a system by placing tantalizing bits of information in key locations.

Correct Answer

verifed

verified

HIDPSs are also known as system ____________________ verifiers.

Correct Answer

verifed

verified

When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________

Correct Answer

verifed

verified

The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________

Correct Answer

verifed

verified

A(n) ____________________ IDPS can adapt its reactions in response to administrator guidance over time and circumstances of the current local environment.

Correct Answer

verifed

verified

In TCP/IP networking, port __________ is not used.


A)  0
B)  1 
C)  13
D)  1023

Correct Answer

verifed

verified

Showing 61 - 80 of 107

Related Exams

Show Answer