Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 2
Quiz 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Question 21
True/False
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
Question 22
True/False
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________
Question 23
True/False
In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________
Question 24
True/False
To use a packet sniffer legally, an administrator only needs permission of the organization's top computing executive.
Question 25
True/False
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
Question 26
True/False
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
Question 27
True/False
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
Question 28
True/False
A(n) event is an indication that a system has just been attacked or is under attack. _________________________
Question 29
True/False
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
Question 30
True/False
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________
Question 31
True/False
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
Question 32
True/False
A(n) server-based IDPS protects the server or host's information assets. _________________________
Question 33
True/False
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Question 34
True/False
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________