Filters
Question type

Study Flashcards

Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.

Correct Answer

verifed

verified

A(n) event is an indication that a system has just been attacked or is under attack. _________________________

Correct Answer

verifed

verified

Three methods dominate IDPS detection methods: the ____________________-based approach, the statistical anomaly-based approach, and the stateful packet inspection approach.

Correct Answer

verifed

verified

HIDPSs are also known as system integrity verifiers.

Correct Answer

verifed

verified

Which of the following ports is commonly used for the HTTP protocol  


A)  20
B)  25 
C)  53
D)  80

Correct Answer

verifed

verified

Alarm ____________________ and compaction is a consolidation of almost identical alarms that happen at close to the same time into a single higher-level alarm.

Correct Answer

verifed

verified

A(n) __________ is an event that triggers an alarm when no actual attack is in progress.


A)  false neutral
B) Attack stimulus 
C)  false negative
D)  noise

Correct Answer

verifed

verified

List and describe the four advantages of HIDPSs.

Correct Answer

verifed

verified

1. An HIDPS can detect local events on h...

View Answer

Which of the following is NOT a described IDPS control strategy  


A)  centralized
B)  fully distributed 
C)  partially distributed
D)  decentralized

Correct Answer

verifed

verified

Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.

Correct Answer

verifed

verified

Intrusion detection and prevention systems can deal effectively with switched networks.

Correct Answer

verifed

verified

The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________

Correct Answer

verifed

verified

In ____________________ protocol verification, the higher-order protocols are examined for unexpected packet behavior or improper use.

Correct Answer

verifed

verified

Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________

Correct Answer

verifed

verified

Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.

Correct Answer

verifed

verified

In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________

Correct Answer

verifed

verified

A(n) server-based IDPS protects the server or host's information assets. _________________________

Correct Answer

verifed

verified

A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.


A)  passive
B)  aggressive 
C)  active
D)  secret

Correct Answer

verifed

verified

A(n) log file monitor is similar to an NIDPS. _________________________

Correct Answer

verifed

verified

__________ is the process of classifying IDPS alerts so that they can be more effectively managed.


A)  Alarm filtering
B)  Alarm clustering 
C)  Alarm compaction
D)  Alarm attenuation

Correct Answer

verifed

verified

Showing 81 - 100 of 107

Related Exams

Show Answer