Deck 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

Full screen (f)
exit full mode
Question
Intrusion detection and prevention systems can deal effectively with switched networks.
Use Space or
up arrow
down arrow
to flip the card.
Question
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
Question
Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.
Question
The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.
Question
All IDPS vendors target users with the same levels of technical and security expertise.
Question
HIDPSs are also known as system integrity verifiers.
Question
An HIDPS can monitor system logs for predefined events.
Question
A false positive is the failure of an IDPS system to react to an actual attack event.
Question
IDPS responses can be classified as active or passive.
Question
A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.
Question
NIDPSs can reliably ascertain whether an attack was successful.
Question
The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
Question
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
Question
An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
Question
In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.
Question
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.
Question
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.
Question
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
Question
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
Question
A fully distributed IDPS control strategy is an IDPS implementation approach in which all control
functions are applied at the physical location of each IDPS component.
Question
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
Question
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________
Question
In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________
Question
To use a packet sniffer legally, an administrator only needs permission of the organization's top computing executive.
Question
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
Question
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
Question
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
Question
A(n) event is an indication that a system has just been attacked or is under attack. _________________________
Question
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
Question
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________
Question
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
Question
A(n) server-based IDPS protects the server or host's information assets. _________________________
Question
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Question
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________
Question
Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.
Question
The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________
Question
A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
Question
Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.
Question
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Question
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
Question
A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________
Question
Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.

A)port knocking
B)doorknob rattling
C)footprinting
D)fingerprinting
Question
A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________
Question
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________
Question
A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.

A)IDPS
B)WiFi
C)UDP
D)DoS
Question
A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________
Question
Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________
Question
Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________
Question
A padded cell is a hardened honeynet. _________________________
Question
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

A)prevention
B)reaction
C)detection
D)correction
Question
__________ is the process of classifying IDPS alerts so that they can be more effectively managed.

A)Alarm filtering
B)Alarm clustering
C)Alarm compaction
D)Alarm attenuation
Question
The primary advantages of a centralized IDPS control strategy are cost and ease of use. _________________________
Question
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________
Question
A(n) log file monitor is similar to an NIDPS. _________________________
Question
For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________
Question
Preconfigured, predetermined attack patterns are called signatures. _________________________
Question
The disadvantages of using the honeypot or padded cell approach include the fact that the technical ​implications of using such devices are not well understood. _________________________
Question
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________
Question
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
Question
A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

A)false neutral
Attack stimulus
C)false negative
D)noise
Question
To use a packet sniffer legally, the administrator must __________.

A)be on a network that the organization owns
B)be under direct authorization of the network's owners
C)have knowledge and consent of the content's creators
D)All of the above
Question
A(n) __________ IDPS is focused on protecting network information assets.

A)network-based
B)host-based
C)application-based
D)server-based
Question
Which of the following ports is commonly used for the HTTP protocol?

A)20
B)25
C)53
D)80
Question
__________ are decoy systems designed to lure potential attackers away from critical systems.

A)Honeypots
B)Bastion hosts
C)Wasp nests
D)Designated targets
Question
The ability to detect a target computer's __________ is very valuable to an attacker.

A)manufacturer
B)operating system
C)peripherals
D)BIOS
Question
In TCP/IP networking, port __________ is not used.

A)0
B)1
C)13
D)1023
Question
__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

A)NIDPSs
B)HIDPSs
C)AppIDPSs
D)SIDPSs
Question
Which of the following is NOT a described IDPS control strategy?

A)centralized
B)fully distributed
C)partially distributed
D)decentralized
Question
Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.

A)aggressive
B)divisive
C)destructive
D)disruptive
Question
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

A)NIDPSs
B)HIDPSs
C)AppIDPSs
D)SIDPSs
Question
Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.

A)LFM
B)stat IDPS
C)AppIDPS
D)HIDPS
Question
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.

A)vulnerabilities
B)fingerprints
C)signatures
D)footprints
Question
__________ is the action of luring an individual into committing a crime to get a conviction.

A)Entrapment
B)Enticement
C)Intrusion
D)Padding
Question
__________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

A)Buzz
B)Fuzz
C)Spike
D)Black
Question
A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

A)passive
B)aggressive
C)active
D)secret
Question
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

A)NIDPS
B)SPAN
C)DPS
D)IDSE
Question
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

A)inline
B)offline
C)passive
D)bypass
Question
__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

A)Honeynet
B)Trap-and-trace
C)HIDPS
D)Packet sniffer
Question
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.

A)passive
B)active
C)reactive
D)dynamic
Question
A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

A)packet scanner
B)packet sniffer
C)honeypot
D)honey packet
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/121
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
1
Intrusion detection and prevention systems can deal effectively with switched networks.
False
2
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
True
3
Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.
False
4
The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
5
All IDPS vendors target users with the same levels of technical and security expertise.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
6
HIDPSs are also known as system integrity verifiers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
7
An HIDPS can monitor system logs for predefined events.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
8
A false positive is the failure of an IDPS system to react to an actual attack event.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
9
IDPS responses can be classified as active or passive.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
10
A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
11
NIDPSs can reliably ascertain whether an attack was successful.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
12
The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
13
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
14
An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
15
In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
16
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
17
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
18
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
19
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
20
A fully distributed IDPS control strategy is an IDPS implementation approach in which all control
functions are applied at the physical location of each IDPS component.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
21
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
23
In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
24
To use a packet sniffer legally, an administrator only needs permission of the organization's top computing executive.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
25
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
26
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
27
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) event is an indication that a system has just been attacked or is under attack. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
29
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
30
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
31
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) server-based IDPS protects the server or host's information assets. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
33
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
34
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
35
Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
36
The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
37
A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
38
Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
39
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
40
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
41
A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
42
Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.

A)port knocking
B)doorknob rattling
C)footprinting
D)fingerprinting
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
44
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.

A)IDPS
B)WiFi
C)UDP
D)DoS
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
46
A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
47
Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
48
Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
49
A padded cell is a hardened honeynet. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
50
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

A)prevention
B)reaction
C)detection
D)correction
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
51
__________ is the process of classifying IDPS alerts so that they can be more effectively managed.

A)Alarm filtering
B)Alarm clustering
C)Alarm compaction
D)Alarm attenuation
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
52
The primary advantages of a centralized IDPS control strategy are cost and ease of use. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
53
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) log file monitor is similar to an NIDPS. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
55
For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
56
Preconfigured, predetermined attack patterns are called signatures. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
57
The disadvantages of using the honeypot or padded cell approach include the fact that the technical ​implications of using such devices are not well understood. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
58
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
59
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

A)false neutral
Attack stimulus
C)false negative
D)noise
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
61
To use a packet sniffer legally, the administrator must __________.

A)be on a network that the organization owns
B)be under direct authorization of the network's owners
C)have knowledge and consent of the content's creators
D)All of the above
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) __________ IDPS is focused on protecting network information assets.

A)network-based
B)host-based
C)application-based
D)server-based
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following ports is commonly used for the HTTP protocol?

A)20
B)25
C)53
D)80
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
64
__________ are decoy systems designed to lure potential attackers away from critical systems.

A)Honeypots
B)Bastion hosts
C)Wasp nests
D)Designated targets
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
65
The ability to detect a target computer's __________ is very valuable to an attacker.

A)manufacturer
B)operating system
C)peripherals
D)BIOS
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
66
In TCP/IP networking, port __________ is not used.

A)0
B)1
C)13
D)1023
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
67
__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

A)NIDPSs
B)HIDPSs
C)AppIDPSs
D)SIDPSs
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
68
Which of the following is NOT a described IDPS control strategy?

A)centralized
B)fully distributed
C)partially distributed
D)decentralized
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
69
Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.

A)aggressive
B)divisive
C)destructive
D)disruptive
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
70
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

A)NIDPSs
B)HIDPSs
C)AppIDPSs
D)SIDPSs
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
71
Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.

A)LFM
B)stat IDPS
C)AppIDPS
D)HIDPS
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
72
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.

A)vulnerabilities
B)fingerprints
C)signatures
D)footprints
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
73
__________ is the action of luring an individual into committing a crime to get a conviction.

A)Entrapment
B)Enticement
C)Intrusion
D)Padding
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
74
__________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

A)Buzz
B)Fuzz
C)Spike
D)Black
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
75
A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

A)passive
B)aggressive
C)active
D)secret
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
76
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

A)NIDPS
B)SPAN
C)DPS
D)IDSE
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
77
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

A)inline
B)offline
C)passive
D)bypass
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
78
__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

A)Honeynet
B)Trap-and-trace
C)HIDPS
D)Packet sniffer
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
79
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.

A)passive
B)active
C)reactive
D)dynamic
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
80
A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

A)packet scanner
B)packet sniffer
C)honeypot
D)honey packet
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 121 flashcards in this deck.