Deck 8: Intrusion Detection and Prevention Systems

ملء الشاشة (f)
exit full mode
سؤال
A hybrid IDPS combines aspects of NIDPS and HIDPS configurations.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?

A) passive only
B) inline only
C) active only
D) online only
سؤال
An NIDPS can tell you whether an attack attempt on the host was successful.
سؤال
A weakness of a signature-based system is that it must keep state information on a possible attack.
سؤال
Which of the following is NOT a method used by passive sensors to monitor traffic?

A) spanning port
B) network tap
C) packet filter
D) load balancer
سؤال
Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic,is resource intensive,and requires extensive tuning and maintenance?

A) brute force
B) heuristic
C) signature
D) anomaly
سؤال
Which of the following is true about an HIDPS?

A) monitors OS and application logs
B) sniffs packets as they enter the network
C) tracks misuse by external users
D) centralized configurations affect host performance
سؤال
Which of the following is an advantage of a signature-based detection system?

A) the definition of what constitutes normal traffic changes
B) it is based on profiles the administrator creates
C) each signature is assigned a number and name
D) the IDPS must be trained for weeks
سؤال
Which of the following is NOT a typical IDPS component?

A) network sensors
B) command console
C) database server
D) Internet gateway
سؤال
Which of the following is considered a problem with a passive,signature-based system?

A) profile updating
B) signature training
C) custom rules
D) false positives
سؤال
Which approach to stateful protocol analysis involves detection of the protocol in use,followed by activation of analyzers that can identify applications not using standard ports?

A) Protocol state tracking
B) IP packet reassembly
C) Traffic rate monitoring
D) Dynamic Application layer protocol analysis
سؤال
No actual traffic passes through a passive sensor; it only monitors copies of the traffic.
سؤال
Which of the following is NOT a network defense function found in intrusion detection and prevention systems?

A) prevention
B) response
C) identification
D) detection
سؤال
Where is a host-based IDPS agent typically placed?

A) on a workstation or server
B) at Internet gateways
C) between remote users and internal network
D) between two subnets
سؤال
What is an advantage of the anomaly detection method?

A) makes use of signatures of well-known attacks
B) system can detect attacks from inside the network by people with stolen accounts
C) easy to understand and less difficult to configure than a signature-based system
D) after installation, the IDPS is trained for several days or weeks
سؤال
Which IDPS customization option is a list of entities known to be harmless?

A) thresholds
B) whitelists
C) blacklists
D) alert settings
سؤال
Which of the following is NOT a primary detection methodology?

A) signature detection
B) baseline detection
C) anomaly detection
D) stateful protocol analysis
سؤال
Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?

A) inline
B) host-based
C) hybrid
D) network-based
سؤال
An IDPS consists of a single device that you install between your firewall and the Internet.
سؤال
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?

A) training period
B) baseline scanning
C) profile monitoring
D) traffic normalizing
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an IDPS component that monitors traffic on a network segment
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
the entire length of an attack
سؤال
__________________ procedures are a set of actions that are spelled out in the security policy and followed if the IDPS detects a true positive.
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an NIDPS sensor that examines copies of traffic on the network
سؤال
Which of the following is true about an NIDPS versus an HIDPS?

A) an NIDPS can determine if a host attack was successful
B) an HIDPS can detect attacks not caught by an NIDPS
C) an HIDPS can detect intrusion attempts on the entire network
D) an NIDPS can compare audit log records
سؤال
Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
the process of maintaining a table of current connections so that abnormal traffic can be identified
سؤال
In a _______________ based detection system,the IDPS can begin working immediately after installation.
سؤال
Which of the following is true about the steps in setting up and using an IDPS?

A) anomaly-based systems come with a database of attack signatures
B) sensors placed on network segments will always capture every packet
C) alerts are sent when a packet doesn't match a stored signature
D) false positives do not compromise network security
سؤال
Why might you want to allow extra time for setting up the database in an anomaly-based system?

A) the installation procedure is usually complex and time consuming
B) to add your own custom rule base
C) it requires special hardware that must be custom built
D) to allow a baseline of data to be compiled
سؤال
A network ____________ is a type of passive sensor that consists of a direct connection between a sensor and the physical network medium.
سؤال
Which of the following is an IDPS security best practice?

A) to prevent false positives, only test the IDPS at initial configuration
B) communication between IDPS components should be encrypted
C) all sensors should be assigned IP addresses
D) log files for HIDPSs should be kept local
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
the ability to track an attempted attack or intrusion back to its source
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
sets of characteristics that describe network services and resources a user or group normally accesses
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through
سؤال
An IDPS __________________ server is the central repository for sensor and agent data.
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
a genuine attack detected successfully by an IDPS
سؤال
If you see a /16 in the header of a snort rule,what does it mean?

A) a maximum of 16 log entries should be kept
B) the size of the log file is 16 MB
C) the subnet mask is 255.255.0.0
D) the detected signature is 16 bits in length
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an attempt to gain unauthorized access to network resources
سؤال
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
increasing an intrusion response to a higher level
سؤال
Describe two advantages and two disadvantages of a signature-based system.
سؤال
List two approaches to stateful protocol analysis.
سؤال
What are the four typical components of an IDPS?
سؤال
Define stateful protocol analysis.Include in your answer the concept of the event horizon.
سؤال
Contrast anomaly detection with signature detection.
سؤال
What is an inline sensor and how is it used to stop attacks?
سؤال
Describe two advantages and two disadvantages of an anomaly-based system.
سؤال
What are the four common entry points to a network where sensors should be placed?
سؤال
What are the three network defense functions performed by an IDPS?
سؤال
List four types of information that an NIDPS typically logs.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Intrusion Detection and Prevention Systems
1
A hybrid IDPS combines aspects of NIDPS and HIDPS configurations.
True
2
Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?

A) passive only
B) inline only
C) active only
D) online only
B
3
An NIDPS can tell you whether an attack attempt on the host was successful.
False
4
A weakness of a signature-based system is that it must keep state information on a possible attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is NOT a method used by passive sensors to monitor traffic?

A) spanning port
B) network tap
C) packet filter
D) load balancer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic,is resource intensive,and requires extensive tuning and maintenance?

A) brute force
B) heuristic
C) signature
D) anomaly
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following is true about an HIDPS?

A) monitors OS and application logs
B) sniffs packets as they enter the network
C) tracks misuse by external users
D) centralized configurations affect host performance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is an advantage of a signature-based detection system?

A) the definition of what constitutes normal traffic changes
B) it is based on profiles the administrator creates
C) each signature is assigned a number and name
D) the IDPS must be trained for weeks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT a typical IDPS component?

A) network sensors
B) command console
C) database server
D) Internet gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is considered a problem with a passive,signature-based system?

A) profile updating
B) signature training
C) custom rules
D) false positives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which approach to stateful protocol analysis involves detection of the protocol in use,followed by activation of analyzers that can identify applications not using standard ports?

A) Protocol state tracking
B) IP packet reassembly
C) Traffic rate monitoring
D) Dynamic Application layer protocol analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
No actual traffic passes through a passive sensor; it only monitors copies of the traffic.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is NOT a network defense function found in intrusion detection and prevention systems?

A) prevention
B) response
C) identification
D) detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Where is a host-based IDPS agent typically placed?

A) on a workstation or server
B) at Internet gateways
C) between remote users and internal network
D) between two subnets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What is an advantage of the anomaly detection method?

A) makes use of signatures of well-known attacks
B) system can detect attacks from inside the network by people with stolen accounts
C) easy to understand and less difficult to configure than a signature-based system
D) after installation, the IDPS is trained for several days or weeks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which IDPS customization option is a list of entities known to be harmless?

A) thresholds
B) whitelists
C) blacklists
D) alert settings
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is NOT a primary detection methodology?

A) signature detection
B) baseline detection
C) anomaly detection
D) stateful protocol analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?

A) inline
B) host-based
C) hybrid
D) network-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
An IDPS consists of a single device that you install between your firewall and the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred to as which of the following?

A) training period
B) baseline scanning
C) profile monitoring
D) traffic normalizing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an IDPS component that monitors traffic on a network segment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
the entire length of an attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
__________________ procedures are a set of actions that are spelled out in the security policy and followed if the IDPS detects a true positive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an NIDPS sensor that examines copies of traffic on the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following is true about an NIDPS versus an HIDPS?

A) an NIDPS can determine if a host attack was successful
B) an HIDPS can detect attacks not caught by an NIDPS
C) an HIDPS can detect intrusion attempts on the entire network
D) an NIDPS can compare audit log records
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group normally accesses on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
the process of maintaining a table of current connections so that abnormal traffic can be identified
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
In a _______________ based detection system,the IDPS can begin working immediately after installation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following is true about the steps in setting up and using an IDPS?

A) anomaly-based systems come with a database of attack signatures
B) sensors placed on network segments will always capture every packet
C) alerts are sent when a packet doesn't match a stored signature
D) false positives do not compromise network security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Why might you want to allow extra time for setting up the database in an anomaly-based system?

A) the installation procedure is usually complex and time consuming
B) to add your own custom rule base
C) it requires special hardware that must be custom built
D) to allow a baseline of data to be compiled
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
A network ____________ is a type of passive sensor that consists of a direct connection between a sensor and the physical network medium.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following is an IDPS security best practice?

A) to prevent false positives, only test the IDPS at initial configuration
B) communication between IDPS components should be encrypted
C) all sensors should be assigned IP addresses
D) log files for HIDPSs should be kept local
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
the ability to track an attempted attack or intrusion back to its source
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
sets of characteristics that describe network services and resources a user or group normally accesses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an NIDPS sensor positioned so that all traffic on the network segment is examined as it passes through
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
An IDPS __________________ server is the central repository for sensor and agent data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
a genuine attack detected successfully by an IDPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
If you see a /16 in the header of a snort rule,what does it mean?

A) a maximum of 16 log entries should be kept
B) the size of the log file is 16 MB
C) the subnet mask is 255.255.0.0
D) the detected signature is 16 bits in length
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
an attempt to gain unauthorized access to network resources
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
MATCHING
a.accountability
b.escalated
c.event horizon
d.inline sensor
e.intrusion
a.accountability f.passive sensor
b.escalated g.profiles
c.event horizon h.sensor
d.inline sensor i.stateful protocol analysis
e.intrusion j.true positive
increasing an intrusion response to a higher level
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe two advantages and two disadvantages of a signature-based system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
List two approaches to stateful protocol analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
What are the four typical components of an IDPS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Define stateful protocol analysis.Include in your answer the concept of the event horizon.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Contrast anomaly detection with signature detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is an inline sensor and how is it used to stop attacks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe two advantages and two disadvantages of an anomaly-based system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
What are the four common entry points to a network where sensors should be placed?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What are the three network defense functions performed by an IDPS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
List four types of information that an NIDPS typically logs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.