Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.
Question 22
True/False
Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.
Question 23
True/False
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Question 24
True/False
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
Question 25
True/False
In the process of protocol
application
verification, the NIDPSs look for invalid data packets. _________________________
Question 26
True/False
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Question 27
True/False
Preconfigured, predetermined attack patterns are called
signatures
. _________________________
Question 28
True/False
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called
noise
. _________________________
Question 29
True/False
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
Question 30
True/False
The process of
entrapment
occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________