Filters
Question type

Study Flashcards

All IDPS vendors target users with the same levels of technical and security expertise.

Correct Answer

verifed

verified

Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.


A) prevention
B) reaction
C) detection
D) correction

Correct Answer

verifed

verified

____ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.


A) NIDPSs
B) HIDPSs
C) AppIDPSs
D) SIDPSs

Correct Answer

verifed

verified

The activities that gather information about the organization and its network activities and assets is called fingerprinting._________________________

Correct Answer

verifed

verified

Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.

Correct Answer

verifed

verified

____________________ is a systematic survey of all of the target organization's Internet addresses.

Correct Answer

verifed

verified

List and describe the three advantages of NIDPSs.

Correct Answer

verifed

verified

1.Good network design and placement of N...

View Answer

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

Correct Answer

verifed

verified

In TCP/IP networking,port ____ is not used.


A) 0
B) 1
C) 13
D) 1023

Correct Answer

verifed

verified

With a(n)____________________ IDPS control strategy all IDPS control functions are implemented and managed in a central location.

Correct Answer

verifed

verified

Alarm filtering is alarm clustering that may be based on combinations of frequency,similarity in attack signature,similarity in attack target,or other criteria that are defined by the system administrators._________________________

Correct Answer

verifed

verified

False

Minutiae are unique points of reference that are digitized and stored in an encrypted format when the user's system access credentials are created._________________________

Correct Answer

verifed

verified

Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.

Correct Answer

verifed

verified

IDPS responses can be classified as active or passive.

Correct Answer

verifed

verified

True

A(n)____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.

Correct Answer

verifed

verified

NIDPSs can reliably ascertain if an attack was successful or not.

Correct Answer

verifed

verified

For Linux or BSD systems,there is a tool called "scanner" that allows a remote individual to "mirror" entire Web sites._________________________

Correct Answer

verifed

verified

False

Enticement is the action of luring an individual into committing a crime to get a conviction._________________________

Correct Answer

verifed

verified

The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.

Correct Answer

verifed

verified

____ is an event that triggers an alarm when no actual attack is in progress.


A) False Positive
B) False Attack Stimulus
C) False Negative
D) Noise

Correct Answer

verifed

verified

Showing 1 - 20 of 108

Related Exams

Show Answer