Filters
Question type

Study Flashcards

____ is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.


A) NIDPS
B) SPAN
C) DPS
D) IDSE

Correct Answer

verifed

verified

A(n) ____ IDPS is focused on protecting network information assets.


A) network-based
B) host-based
C) application-based
D) server-based

Correct Answer

verifed

verified

A(n)log file monitor is similar to a NIDPS._________________________

Correct Answer

verifed

verified

When the measured activity is outside the baseline parameters,it is said to exceed the ____________________ level.

Correct Answer

verifed

verified

To secure data in transit across any network,organizations must use ____________________ to be assured of content privacy.

Correct Answer

verifed

verified

Most of the technologies that scan human characteristics convert these images to some form of minutiae.

Correct Answer

verifed

verified

List and describe the four advantages of HIDPSs.

Correct Answer

verifed

verified

1.A HIDPS can detect local events on hos...

View Answer

When a collection of honeypots connects several honeypot systems on a subnet,it may be called a(n)____________________.

Correct Answer

verifed

verified

A signature-based IDPS is sometimes called a(n)____________________-based IDPS.

Correct Answer

verifed

verified

A HIDPS is optimized to detect multihost scanning,and it is able to detect the scanning of non-host network devices,such as routers or switches.

Correct Answer

verifed

verified

Under the guise of justice,some less scrupulous administrators may be tempted to ____________________,or hack into a hacker's system to find out as much as possible about the hacker.

Correct Answer

verifed

verified

____ applications use a combination of techniques to detect an intrusion and then trace it back to its source.


A) Trace and treat
B) Trap and trace
C) Treat and trap
D) Trace and clip

Correct Answer

verifed

verified

IDPS researchers have used padded cell and honeypot systems since the late ____.


A) 1960s
B) 1970s
C) 1980s
D) 1990s

Correct Answer

verifed

verified

A HIDPS can monitor systems logs for predefined events.

Correct Answer

verifed

verified

An alert or intrusion is an indication that a system has just been attacked or is under attack._________________________

Correct Answer

verifed

verified

A(n)listener vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software._________________________

Correct Answer

verifed

verified

Among all possible biometrics,____ is(are) considered truly unique.


A) retina of the eye
B) fingerprints
C) iris of the eye
D) All of the above

Correct Answer

verifed

verified

The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.

Correct Answer

verifed

verified

A(n)server-based IDPS protects the server or host's information assets._________________________

Correct Answer

verifed

verified

A strategy based on the concept of defense in depth is likely to include intrusion detection systems,active vulnerability scanners,passive vulnerability scanners,automated log analyzers,and protocol analyzers.

Correct Answer

verifed

verified

Showing 61 - 80 of 108

Related Exams

Show Answer