Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
Intrusion detection and prevention systems can deal effectively with switched networks.
Question 2
True/False
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.
Question 3
True/False
HIDPSs are also known as system integrity verifiers.
Question 4
True/False
Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.
Question 5
True/False
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
Question 6
True/False
An HIDPS can monitor system logs for predefined events.
Question 7
True/False
IDPS responses can be classified as active or passive.
Question 8
True/False
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
Question 9
True/False
A false positive is the failure of an IDPS system to react to an actual attack event.
Question 10
True/False
A fully distributed IDPS control strategy is an IDPS implementation approach in which all controlfunctions are applied at the physical location of each IDPS component.
Question 11
True/False
NIDPSs can reliably ascertain whether an attack was successful.
Question 12
True/False
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
Question 13
True/False
All IDPS vendors target users with the same levels of technical and security expertise.
Question 14
True/False
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
Question 15
True/False
The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
Question 16
True/False
A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.
Question 17
True/False
In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.