Filters
Question type

Study Flashcards

Intrusion detection and prevention systems can deal effectively with switched networks.

Correct Answer

verifed

verified

A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.


A) packet scanner
B) packet sniffer
C) honey pot
D) honey packet

Correct Answer

verifed

verified

A(n)____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system,almost always with the intent to do harm.

Correct Answer

verifed

verified

A(n)port is a network channel or connection point in a data communications system._________________________

Correct Answer

verifed

verified

A false positive is the failure of an IDPS system to react to an actual attack event.

Correct Answer

verifed

verified

The ____ is the level at which the number of false rejections equals the false acceptances,and is also known as the equal error rate.


A) BIOM
B) REC
C) IIS
D) CER

Correct Answer

verifed

verified

The Simple Network Management Protocol contains trap functions,which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed,either positively or negatively.

Correct Answer

verifed

verified

A sniffer cannot be used to eavesdrop on network traffic.

Correct Answer

verifed

verified

A padded cell is a hardened honeynet._________________________

Correct Answer

verifed

verified

The false detect rate is the percentage of identification instances in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device._________________________

Correct Answer

verifed

verified

____ is the process of classifying IDPS alerts so that they can be more effectively managed.


A) Alarm filtering
B) Alarm clustering
C) Alarm compaction
D) Alarm attenuation

Correct Answer

verifed

verified

A(n) ____ is a proposed systems user.


A) authenticator
B) challenger
C) supplicant
D) activator

Correct Answer

verifed

verified

HIDPSs are also known as system integrity verifiers.

Correct Answer

verifed

verified

In DNS cache poisoning,valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on the network.

Correct Answer

verifed

verified

A(n) ____ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.


A) IDS
B) IIS
C) ITS
D) SIS

Correct Answer

verifed

verified

The ____________________ port is also known as a switched port analysis port or mirror port.

Correct Answer

verifed

verified

In order to determine which IDPS best meets an organization's needs,first consider the organizational environment in technical,physical,and political terms.

Correct Answer

verifed

verified

____________________ is the process of attracting attention to a system by placing tantalizing bits of information in key locations.

Correct Answer

verifed

verified

A(n)NIDPS functions on the host system,where encrypted traffic will have been decrypted and is available for processing._________________________

Correct Answer

verifed

verified

The trace usually consists of a honeypot or padded cell and an alarm._________________________

Correct Answer

verifed

verified

Showing 81 - 100 of 108

Related Exams

Show Answer