Filters
Question type

Study Flashcards

Minutiae are unique points of reference that are digitized and stored in an encrypted format when the user's system access credentials are created._________________________

A) True
B) False

Correct Answer

verifed

verified

Alarm filtering is alarm clustering that may be based on combinations of frequency,similarity in attack signature,similarity in attack target,or other criteria that are defined by the system administrators._________________________

A) True
B) False

Correct Answer

verifed

verified

False

____ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.


A) NIDPSs
B) HIDPSs
C) AppIDPSs
D) SIDPSs

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In TCP/IP networking,port ____ is not used.


A) 0
B) 1
C) 13
D) 1023

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.

A) True
B) False

Correct Answer

verifed

verified

The statistical anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.

A) True
B) False

Correct Answer

verifed

verified

Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.

A) True
B) False

Correct Answer

verifed

verified

List and describe the three advantages of NIDPSs.

Correct Answer

verifed

verified

1.Good network design and placement of N...

View Answer

With a(n)____________________ IDPS control strategy all IDPS control functions are implemented and managed in a central location.

Correct Answer

verifed

verified

A(n)____________________-based IDPS resides on a particular computer or server and monitors activity only on that system.

Correct Answer

verifed

verified

____________________ is a systematic survey of all of the target organization's Internet addresses.

Correct Answer

verifed

verified

For Linux or BSD systems,there is a tool called "scanner" that allows a remote individual to "mirror" entire Web sites._________________________

A) True
B) False

Correct Answer

verifed

verified

False

IDPS responses can be classified as active or passive.

A) True
B) False

Correct Answer

verifed

verified

True

All IDPS vendors target users with the same levels of technical and security expertise.

A) True
B) False

Correct Answer

verifed

verified

____ is an event that triggers an alarm when no actual attack is in progress.


A) False Positive
B) False Attack Stimulus
C) False Negative
D) Noise

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Enticement is the action of luring an individual into committing a crime to get a conviction._________________________

A) True
B) False

Correct Answer

verifed

verified

Intrusion ____ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.


A) prevention
B) reaction
C) detection
D) correction

E) All of the above
F) None of the above

Correct Answer

verifed

verified

The activities that gather information about the organization and its network activities and assets is called fingerprinting._________________________

A) True
B) False

Correct Answer

verifed

verified

NIDPSs can reliably ascertain if an attack was successful or not.

A) True
B) False

Correct Answer

verifed

verified

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 108

Related Exams

Show Answer