Filters
Question type

Study Flashcards

The disadvantages of using the honeypot or padded cell approach include the fact that the technical ​implications of using such devices are not well understood. _________________________

Correct Answer

verifed

verified

Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.

Correct Answer

verifed

verified

IDPS responses can be classified as active or passive.

Correct Answer

verifed

verified

A fully distributed IDPS control strategy is an IDPS implementation approach in which all controlfunctions are applied at the physical location of each IDPS component.

Correct Answer

verifed

verified

A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________

Correct Answer

verifed

verified

All IDPS vendors target users with the same levels of technical and security expertise.

Correct Answer

verifed

verified

A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.


A)  IDPS
B)  WiFi 
C)  UDP
D)  DoS

Correct Answer

verifed

verified

An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.

Correct Answer

verifed

verified

Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.

Correct Answer

verifed

verified

With a(n) ____________________ IDPS control strategy, all IDPS control functions are implemented and managed in a central location.

Correct Answer

verifed

verified

____________________ scanning will allow an Nmap user to bounce a scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.

Correct Answer

verifed

verified

A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________

Correct Answer

verifed

verified

A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________

Correct Answer

verifed

verified

A ____________________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

Correct Answer

verifed

verified

The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________

Correct Answer

verifed

verified

When the measured activity is outside the baseline parameters, it is said to exceed the ____________________ level.

Correct Answer

verifed

verified

__________ are decoy systems designed to lure potential attackers away from critical systems.


A)  Honeypots
B)  Bastion hosts 
C)  Wasp nests
D)  Designated targets

Correct Answer

verifed

verified

Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________

Correct Answer

verifed

verified

The ____________________ port is also known as a switched port analysis (SPAN) port or mirror port.

Correct Answer

verifed

verified

A packet ____________________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

Correct Answer

verifed

verified

Showing 21 - 40 of 107

Related Exams

Show Answer