Filters
Question type

Study Flashcards

When placed next to a hub,switch,or other key networking device,the NIDS may use that device's monitoring port,also known as a(n) ____ port or mirror port.


A) SWAN
B) HID
C) SPAN
D) IDS

Correct Answer

verifed

verified

Briefly describe the tasks involved in managing logs.

Correct Answer

verifed

verified

Managing logs involves the following:
1....

View Answer

____ are also known as system integrity verifiers.


A) Alarm filters
B) Honeypot Farms
C) HIDSs
D) Scanning utilities

Correct Answer

verifed

verified

A(n) ____ is designed to be placed in a network to determine whether or not the network is being used in ways that are out of compliance with the policy of the organization.


A) alert
B) security policy
C) intrusion detection system
D) DNS cache

Correct Answer

verifed

verified

List five reasons why you would acquire and use an IDS.

Correct Answer

verifed

verified

The reasons include:
To prevent problem ...

View Answer

Discuss two weaknesses of the signature-based IDS technology.

Correct Answer

verifed

verified

The problem with this approach is that a...

View Answer

Using a process known as ____,Network IDSs must look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be underway.


A) clipping
B) cache poisoning
C) scanning
D) signature matching

Correct Answer

verifed

verified

Match each statement with an item below. -The process of attracting attention to a system by placing tantalizing bits of information in key locations.


A) Intrusion detection system
B) HIDS
C) Signature-based IDS
D) Enticement
E) Entrapment
F) Alarm clustering
G) NIDS
H) Nmap
I) Scanning utility

Correct Answer

verifed

verified

The failure of an IDS system to react to an actual attack event is known as a ____.


A) false positive
B) false negative
C) Confidence Value
D) site policy

Correct Answer

verifed

verified

A ____ is an alarm or alert that indicates that an attack is in progress or that an attack has successfully occurred when in fact there was no such attack.


A) false positive
B) false negative
C) Confidence Value
D) site policy

Correct Answer

verifed

verified

A(n) ____ is an event that triggers alarms and causes a false positive when no actual attacks are in progress.


A) alert
B) false negative
C) false attack stimulus
D) True Attack Stimulus

Correct Answer

verifed

verified

Match each statement with an item below. -Can indicate if a relationship exists between the individual alarm elements when they have specific similar attributes.


A) Intrusion detection system
B) HIDS
C) Signature-based IDS
D) Enticement
E) Entrapment
F) Alarm clustering
G) NIDS
H) Nmap
I) Scanning utility

Correct Answer

verifed

verified

____ is an ongoing activity from alarm events that are accurate and noteworthy but not necessarily significant as potentially successful attacks.


A) Alarm compaction
B) Cache poisoning
C) Noise
D) Alarm Clustering

Correct Answer

verifed

verified

What are the advantages and disadvantages of HIDS?

Correct Answer

verifed

verified

Advantages
1.A HIDS can detect local eve...

View Answer

The term ____ refers to an event that triggers alarms and causes an IDS to react as if a real attack is in progress.


A) True Attack Stimulus
B) false positive
C) Confidence Value
D) Alarm Compaction

Correct Answer

verifed

verified

The purpose of a NIDS is to look for patterns within network traffic that indicate an intrusion event is underway or about to begin.

Correct Answer

verifed

verified

Match each statement with an item below. -The action of luring an individual into committing a crime to get a conviction.


A) Intrusion detection system
B) HIDS
C) Signature-based IDS
D) Enticement
E) Entrapment
F) Alarm clustering
G) NIDS
H) Nmap
I) Scanning utility

Correct Answer

verifed

verified

What are the steps involved in monitoring networks for signs of intrusion?

Correct Answer

verifed

verified

One accomplishes this in the following m...

View Answer

Match each statement with an item below. -Network burglar alarm.


A) Intrusion detection system
B) HIDS
C) Signature-based IDS
D) Enticement
E) Entrapment
F) Alarm clustering
G) NIDS
H) Nmap
I) Scanning utility

Correct Answer

verifed

verified

According to Pipkin,what are the four types of incident candidates that are probable indicators of actual incidents? Provide a brief description of each incident candidate.

Correct Answer

verifed

verified

1.Activities at unexpected times: If tra...

View Answer

Showing 21 - 40 of 49

Related Exams

Show Answer