Filters
Question type

__________ are decoy systems designed to lure potential attackers away from critical systems.


A) Honeypots
B) Bastion hosts
C) Wasp nests
D) Designated targets

Correct Answer

verifed

verified

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________

Correct Answer

verifed

verified

The use of switched network protocols does not affect an HIDPS.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The statement "The use of switched netwo...

View Answer

A fully distributed IDPS control strategy is an IDPS implementation approach in which all control functions are applied at the physical location of each IDPS component.

Correct Answer

verifed

verified

To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

To prevent problem behaviors by increasi...

View Answer

The ____________________ port is also known as a switched port analysis (SPAN) port or mirror port.

Correct Answer

verifed

verified

Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________

Correct Answer

verifed

verified

Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.


A) LFM
B) stat IDPS
C) AppIDPS
D) HIDPS

Correct Answer

verifed

verified

To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.

Correct Answer

verifed

verified

A false positive is the failure of an IDPS system to react to an actual attack event.

Correct Answer

verifed

verified

A(n) __________ IDPS is focused on protecting network information assets.


A) network-based
B) host-based
C) application-based
D) server-based

Correct Answer

verifed

verified

An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.

Correct Answer

verifed

verified

A padded cell is a hardened honeynet. _________________________

Correct Answer

verifed

verified

NIDPSs are not usually susceptible to direct attack and may not be detectable by attackers.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Network Intrusion Detection and Preventi...

View Answer

An HIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

An HIDPS, or Host Intrusion Detection an...

View Answer

A ____________________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

Correct Answer

verifed

verified

A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

Correct Answer

verifed

verified

HIDPSs are also known as system ____________________ verifiers.

Correct Answer

verifed

verified

Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.

Correct Answer

verifed

verified

The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________

Correct Answer

verifed

verified

Showing 101 - 120 of 121

Related Exams

Show Answer