Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Geology/Geography/Oceanography/Atmospheric Sciences
Study Set
Principles of Incident Response
Quiz 4: Incident Response: Detection and Decision Making
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Match each statement with an item below.
-Triggers an alert or alarm when one of the following changes occurs: file attributes change,new files are created,or existing files are deleted.
Question 22
Short Answer
A(n)____________________ can adapt its reaction activities based on both guidance learned over time from the administrator as well as circumstances present in the local environment.
Question 23
Multiple Choice
Match each statement with an item below.
-A widely used port scanner.
Question 24
Short Answer
_________________________ is the process of evaluating circumstances around organizational events,determining which events are possible incidents,or incident candidates,and then determining whether or not the event constitutes an actual incident.
Question 25
Multiple Choice
The task of monitoring file systems for unauthorized change is best performed by using a(n) ____.
Question 26
Short Answer
The term ____________________ refers to a consolidation of almost identical alarms into a single higher-level alarm.
Question 27
Multiple Choice
Match each statement with an item below.
-Looks for indications of ongoing or successful attacks and resides on a computer or appliance connected to that network segment.
Question 28
Multiple Choice
Match each statement with an item below.
-Network burglar alarm.
Question 29
Multiple Choice
Match each statement with an item below.
-Tool used to identify which computers are active on a network,as well as which ports and services are active on the computers,what function or role the machines may be fulfilling,and so on.
Question 30
Multiple Choice
Match each statement with an item below.
-The action of luring an individual into committing a crime to get a conviction.
Question 31
Multiple Choice
A ____ is a computer server configured to resemble a production system,containing rich information just begging to be hacked.
Question 32
Multiple Choice
A ____ is a high-interaction honeypot designed to capture extensive information on threats.
Question 33
Multiple Choice
Match each statement with an item below.
-Examines data traffic in search of patterns that match known signatures - that is,preconfigured,predetermined attack patterns.
Question 34
Multiple Choice
Match each statement with an item below.
-The process of attracting attention to a system by placing tantalizing bits of information in key locations.
Question 35
Multiple Choice
A ____ is a type of IDS that is similar to the NIDS,reviews the log files generated by servers,network devices,and even other IDSs.
Question 36
Multiple Choice
____ are tools used to identify which computers are active on a network,as well as which ports and services are active on the computers,what function or role the machines may be fulfilling,and so on.