Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 1
Quiz 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 41
True/False
A padded cell is a hardened honeynet._________________________
Question 42
Multiple Choice
Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
Question 43
True/False
The false detect rate is the percentage of identification instances in which unauthorized users are allowed access to systems or areas as a result of a failure in the biometric device._________________________
Question 44
True/False
Enticement is the action of luring an individual into committing a crime to get a conviction._________________________
Question 45
Multiple Choice
____ is an event that triggers an alarm when no actual attack is in progress.
Question 46
True/False
A(n)partially distributed IDPS control strategy combines the best of the other two strategies._________________________
Question 47
True/False
A wireless security toolkit should include the ability to sniff wireless traffic,scan wireless hosts,and assess the level of privacy or confidentiality afforded on the wireless network._________________________
Question 48
True/False
Minutiae are unique points of reference that are digitized and stored in an encrypted format when the user's system access credentials are created._________________________
Question 49
True/False
The trace usually consists of a honeypot or padded cell and an alarm._________________________
Question 50
True/False
For Linux or BSD systems,there is a tool called "scanner" that allows a remote individual to "mirror" entire Web sites._________________________
Question 51
True/False
When a collection of honeypots connects several honeypot systems on a subnet,it may be called a(n)honeynet._________________________
Question 52
Multiple Choice
A(n) ____ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.
Question 53
True/False
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization._________________________
Question 54
True/False
The trap is a process by which the organization attempts to identify an entity discovered in unauthorized areas of the network or systems._________________________
Question 55
True/False
Port fingers are tools used by both attackers and defenders to identify (or fingerprint)the computers that are active on a network,as well as the ports and services active on those computers,the functions and roles the machines are fulfilling,and other useful information._________________________
Question 56
True/False
A(n)listener vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software._________________________