Ready to test your Knowledge?
Try out our new practice tests completely free!
exam preparation banner icon

Network Defense

Computing

Quiz 5 :

Intrusion-Detection Systems

Quiz 5 :

Intrusion-Detection Systems

search
arrow
Following rules and learning from experience as part of the process to identify and notify an administrator about an intrusion are typical when Snort is operating in which mode?
Free
Multiple Choice
Answer:

Answer:

B

arrow
An intrusion-detection method that measures and monitors how programs use system resources is called:
Free
Multiple Choice
Answer:

Answer:

A

arrow
Which intrusion-detection method measures activity levels against known short-term and\or long-term work profiles?
Free
Multiple Choice
Answer:

Answer:

D

arrow
Implementation of intrusion deflection as a strategy requires the use of:
Multiple Choice
Answer:
arrow
Symantec Decoy Server does all of the following EXCEPT:
Multiple Choice
Answer:
arrow
Attempts by an intruder to determine information about a system prior to the start of an intrusion attack is called:
Multiple Choice
Answer:
arrow
Which strategy is used in the implementation of intrusion deterrence?
Multiple Choice
Answer:
arrow
What might one see in an implementation of intrusion deterrence?
Multiple Choice
Answer:
arrow
In which mode of operation does Snort display a continuous stream of packet contents to the console?
Multiple Choice
Answer:
arrow
____________ is the process an intruder uses to gain as much information as possible about a target system in the early stages of attack preparation.
Short Answer
Answer:
arrow
Which intrusion detection strategy monitors and compares activity against preset acceptable levels?
Multiple Choice
Answer:
arrow
Which is NOT a function of an intrusion-detection system?
Multiple Choice
Answer:
arrow
Banishment vigilance is another name for ____________.
Short Answer
Answer:
arrow
One type of intrusion-detection and avoidance which involves identifying suspect IP addresses and preventing intrusions is called:
Multiple Choice
Answer:
arrow
Which is NOT one of the basic premises under which a honey pot functions?
Multiple Choice
Answer:
arrow
An intrusion-detection system detecting a series of ICMP packets sent to each port from the same IP address might indicate:
Multiple Choice
Answer:
arrow
Banishment vigilance is another name for:
Multiple Choice
Answer:
arrow
Which type of intrusion-detection relies on people rather than software or hardware?
Multiple Choice
Answer:
arrow
The system administrator can be alerted by a(n)____________ to attempts to breach a system.
Short Answer
Answer:
arrow
Which method of intrusion-detection develops historic usage levels to measure activity against?
Multiple Choice
Answer:
Showing 1 - 20 of 26