Deck 8: Intrusion Detection

ملء الشاشة (f)
exit full mode
سؤال
Snort can perform intrusion prevention but not intrusion detection.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Those who hack into computers do so for the thrill of it or for status.
سؤال
Signature-based approaches attempt to define normal,or expected,
behavior,whereas anomaly approaches attempt to define proper behavior.
سؤال
A ________ monitors network traffic for particular network segments or devices and analyzes network,transport,and application protocols to identify suspicious activity.

A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
سؤال
An inline sensor monitors a copy of network traffic; the actual traffic
does not pass through the device.
سؤال
_________ are among the most difficult to detect and prevent.

A)Organized groups of hackers
B)Insider attacks
C)Outsider attacks
D)Crackers
سؤال
An intruder can also be referred to as a hacker or cracker.
سؤال
Anomaly detection is effective against misfeasors.
سؤال
The objective of the intruder is to gain access to a system or to increase
the range of privileges accessible on a system.
سؤال
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
سؤال
The ________ is responsible for determining if an intrusion has occurred.

A)analyzer
B)host
C)user interface
D)sensor
سؤال
To be of practical use an IDS should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.
سؤال
Network-based intrusion detection makes use of signature detection
and anomaly detection.
سؤال
The masquerader is most likely an insider.
سؤال
The primary purpose of an IDS is to detect intrusions,log suspicious
events,and send alerts.
سؤال
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

A)intrusion detection
B)IDS
C)criminal enterprise
D)security intrusion
سؤال
The IDS component responsible for collecting data is the user interface.
سؤال
A common location for a NIDS sensor is just inside the external
firewall.
سؤال
Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
سؤال
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
سؤال
The _________ module analyzes LAN traffic and reports the results to the central manager.

A)LAN monitor agent
B)host agent
C)central manager agent
D)architecture agent
سؤال
_________ are cooperative ventures that collect information about system vulnerabilities and disseminate it to systems mangers.
سؤال
A(n)________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.

A)passive sensor
B)analysis sensor
C)LAN sensor
D)inline sensor
سؤال
A(n)________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way.

A)PEP
B)DDI
C)IDEP
D)IDME
سؤال
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
سؤال
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.

A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
سؤال
__________ is a security service that monitors and analyzes system events for the purpose of finding,and providing real-time warning of attempts to access system resources in an unauthorized manner.
سؤال
The three classes of intruders are masquerader,clandestine user and _________.
سؤال
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
سؤال
The _________ detection approach involves defining thresholds,independent of user,for the frequency of occurrence of various events.
سؤال
_________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
سؤال
A ________ is a legitimate user who accesses data,programs,or resources for which such access is not authorized,or who is authorized for such access but misuses his or her privileges.
سؤال
_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.

A)RFC 4767
B)RFC 4766
C)RFC 4765
D)RFC 4764
سؤال
The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.

A)protocol
B)direction
C)action
D)destination port
سؤال
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.

A)central manager agent
B)LAN monitor agent
C)host agent
D)architecture agent
سؤال
An IDS comprises three logical components: analyzers,user interface and _____.
سؤال
A ________ model is used to establish transition probabilities among various states.

A)multivariate model
B)Markov process
C)time series
D)operational model
سؤال
A distributed IDS consists of three main components: host agent module,central manager module,and ___________ module.
سؤال
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.

A)data source
B)sensor
C)operator
D)analyzer
سؤال
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
سؤال
________ are decoy systems that are designed to lure a potential attacker away from critical systems.
سؤال
A Snort installation consists of four logical components: packet decoder,detection engine,logger,and ________.
سؤال
The functional components of an _________ are: data source,sensor,analyzer,administration,manager,and operator.
سؤال
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
سؤال
The _________ (RFC 4766)document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Intrusion Detection
1
Snort can perform intrusion prevention but not intrusion detection.
False
2
Those who hack into computers do so for the thrill of it or for status.
True
3
Signature-based approaches attempt to define normal,or expected,
behavior,whereas anomaly approaches attempt to define proper behavior.
False
4
A ________ monitors network traffic for particular network segments or devices and analyzes network,transport,and application protocols to identify suspicious activity.

A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
An inline sensor monitors a copy of network traffic; the actual traffic
does not pass through the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
_________ are among the most difficult to detect and prevent.

A)Organized groups of hackers
B)Insider attacks
C)Outsider attacks
D)Crackers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
An intruder can also be referred to as a hacker or cracker.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Anomaly detection is effective against misfeasors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
The objective of the intruder is to gain access to a system or to increase
the range of privileges accessible on a system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

A)host-based IDS
B)security intrusion
C)network-based IDS
D)intrusion detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ________ is responsible for determining if an intrusion has occurred.

A)analyzer
B)host
C)user interface
D)sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
To be of practical use an IDS should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
Network-based intrusion detection makes use of signature detection
and anomaly detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
The masquerader is most likely an insider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
The primary purpose of an IDS is to detect intrusions,log suspicious
events,and send alerts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

A)intrusion detection
B)IDS
C)criminal enterprise
D)security intrusion
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
The IDS component responsible for collecting data is the user interface.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
A common location for a NIDS sensor is just inside the external
firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
The _________ module analyzes LAN traffic and reports the results to the central manager.

A)LAN monitor agent
B)host agent
C)central manager agent
D)architecture agent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
_________ are cooperative ventures that collect information about system vulnerabilities and disseminate it to systems mangers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n)________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.

A)passive sensor
B)analysis sensor
C)LAN sensor
D)inline sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
A(n)________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way.

A)PEP
B)DDI
C)IDEP
D)IDME
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.

A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
__________ is a security service that monitors and analyzes system events for the purpose of finding,and providing real-time warning of attempts to access system resources in an unauthorized manner.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
The three classes of intruders are masquerader,clandestine user and _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.

A)Profile based detection
B)Signature detection
C)Threshold detection
D)Anomaly detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
The _________ detection approach involves defining thresholds,independent of user,for the frequency of occurrence of various events.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
_________ anomaly detection focuses on characterizing the past behavior of individual users or related groups of users and then detecting significant deviations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
A ________ is a legitimate user who accesses data,programs,or resources for which such access is not authorized,or who is authorized for such access but misuses his or her privileges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.

A)RFC 4767
B)RFC 4766
C)RFC 4765
D)RFC 4764
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.

A)protocol
B)direction
C)action
D)destination port
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.

A)central manager agent
B)LAN monitor agent
C)host agent
D)architecture agent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
An IDS comprises three logical components: analyzers,user interface and _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A ________ model is used to establish transition probabilities among various states.

A)multivariate model
B)Markov process
C)time series
D)operational model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
A distributed IDS consists of three main components: host agent module,central manager module,and ___________ module.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.

A)data source
B)sensor
C)operator
D)analyzer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
________ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
________ are decoy systems that are designed to lure a potential attacker away from critical systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
A Snort installation consists of four logical components: packet decoder,detection engine,logger,and ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The functional components of an _________ are: data source,sensor,analyzer,administration,manager,and operator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The _________ (RFC 4766)document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.