Deck 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools

Full screen (f)
exit full mode
Question
Intrusion detection and prevention systems can deal effectively with switched networks.
Use Space or
up arrow
down arrow
to flip the card.
Question
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.
Question
HIDPSs are also known as system integrity verifiers.
Question
Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.
Question
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
Question
An HIDPS can monitor system logs for predefined events.
Question
IDPS responses can be classified as active or passive.
Question
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
Question
A false positive is the failure of an IDPS system to react to an actual attack event.
Question
A fully distributed IDPS control strategy is an IDPS implementation approach in which all controlfunctions are applied at the physical location of each IDPS component.
Question
NIDPSs can reliably ascertain whether an attack was successful.
Question
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
Question
All IDPS vendors target users with the same levels of technical and security expertise.
Question
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
Question
The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
Question
A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.
Question
In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.
Question
An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
Question
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.
Question
The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.
Question
Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.
Question
Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.
Question
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Question
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
Question
In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________
Question
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Question
Preconfigured, predetermined attack patterns are called signatures. _________________________
Question
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
Question
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
Question
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________
Question
The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________
Question
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
Question
A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
Question
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________
Question
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
Question
A(n) server-based IDPS protects the server or host's information assets. _________________________
Question
A(n) event is an indication that a system has just been attacked or is under attack. _________________________
Question
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
Question
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
Question
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________
Question
__________ is the process of classifying IDPS alerts so that they can be more effectively managed.

A) Alarm filtering
B) Alarm clustering 
C) Alarm compaction
D) Alarm attenuation
Question
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
Question
For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________
Question
A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________
Question
A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

A) false neutral
Attack stimulus 
C) false negative
D) noise
Question
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________
Question
A(n) __________ IDPS is focused on protecting network information assets.

A) network-based
B) host-based 
C) application-based
D) server-based
Question
A(n) log file monitor is similar to an NIDPS. _________________________
Question
A padded cell is a hardened honeynet. _________________________
Question
Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.

A) port knocking
B) doorknob rattling 
C) footprinting
D) fingerprinting
Question
The disadvantages of using the honeypot or padded cell approach include the fact that the technical ​implications of using such devices are not well understood. _________________________
Question
A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________
Question
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

A) prevention
B) reaction 
C) detection
D) correction
Question
A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.

A) IDPS
B) WiFi 
C) UDP
D) DoS
Question
A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________
Question
Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________
Question
The primary advantages of a centralized IDPS control strategy are cost and ease of use. _________________________
Question
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________
Question
Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________
Question
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________
Question
The ability to detect a target computer's __________ is very valuable to an attacker.

A) manufacturer
B) operating system  
C) peripherals
D) BIOS
Question
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.

A) passive
B) active 
C) reactive
D) dynamic
Question
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

A) inline
B) offline 
C) passive
D) bypass
Question
Which of the following ports is commonly used for the HTTP protocol  

A) 20
B) 25 
C) 53
D) 80
Question
In TCP/IP networking, port __________ is not used.

A) 0
B) 1 
C) 13
D) 1023
Question
Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.

A) LFM
B) stat IDPS 
C) AppIDPS
D) HIDPS
Question
A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

A) packet scanner
B) packet sniffer 
C) honeypot
D) honey packet
Question
__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

A) NIDPSs
B) HIDPSs 
C) AppIDPSs
D) SIDPSs
Question
A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

A) passive
B) aggressive 
C) active
D) secret
Question
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.

A) vulnerabilities
B) fingerprints 
C) signatures
D) footprints
Question
__________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

A) Buzz
B) Fuzz 
C) Spike
D) Black
Question
__________ is the action of luring an individual into committing a crime to get a conviction.

A) Entrapment
B) Enticement 
C) Intrusion
D) Padding
Question
Which of the following is NOT a described IDPS control strategy  

A) centralized
B) fully distributed 
C) partially distributed
D) decentralized
Question
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

A) NIDPS
B) SPAN 
C) DPS
D) IDSE
Question
Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.

A) aggressive
B) divisive 
C) destructive
D) disruptive
Question
To use a packet sniffer legally, the administrator must __________.

A) be on a network that the organization owns
B) be under direct authorization of the network's owners 
C) have knowledge and consent of the content's creators
D) All of the above
Question
__________ are decoy systems designed to lure potential attackers away from critical systems.

A) Honeypots
B) Bastion hosts 
C) Wasp nests
D) Designated targets
Question
A(n) ____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.
Question
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

A) NIDPSs
B) HIDPSs 
C) AppIDPSs
D) SIDPSs
Question
__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

A) Honeynet
B) Trap-and-trace 
C) HIDPS
D) Packet sniffer
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/107
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
1
Intrusion detection and prevention systems can deal effectively with switched networks.
False
2
An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.
True
3
HIDPSs are also known as system integrity verifiers.
True
4
Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
5
Intrusion detection and prevention systems perform monitoring and analysis of system events and user behaviors.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
6
An HIDPS can monitor system logs for predefined events.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
7
IDPS responses can be classified as active or passive.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
8
Intrusion detection consists of procedures and systems that identify system intrusions and take action when an intrusion is detected.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
9
A false positive is the failure of an IDPS system to react to an actual attack event.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
10
A fully distributed IDPS control strategy is an IDPS implementation approach in which all controlfunctions are applied at the physical location of each IDPS component.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
11
NIDPSs can reliably ascertain whether an attack was successful.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
12
The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
13
All IDPS vendors target users with the same levels of technical and security expertise.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
14
An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
15
The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
16
A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
17
In order to determine which IDPS best meets an organization's needs, first consider the organizational environment in technical, physical, and political terms.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
18
An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
19
In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information and corrupt the servers' answers to routine DNS queries from other systems on the network.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
20
The process by which attackers change the format and/or timing of their activities to avoid being detected by the IDPS is known as a false attack stimulus.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
21
Services using the TCP/IP protocol can run only on their commonly used port number as specified in their original Internet standard.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
22
Security tools that go beyond routine intrusion detection include honeypots, honeynets, and padded cell systems.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
23
A strategy based on the concept of defense in depth is likely to include intrusion detection systems, active vulnerability scanners, passive vulnerability scanners, automated log analyzers, and protocol analyzers.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
24
Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
25
In the process of protocol application verification, the NIDPSs look for invalid data packets. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
26
To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
27
Preconfigured, predetermined attack patterns are called signatures. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
28
Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
29
Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open or poorly configured firewall will not help the network defender minimize the risk from attack.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
30
The process of entrapment occurs when an attacker changes the format and/or timing of activities to avoid being detected by an IDPS. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
31
The activities that gather public information about the organization and its network activities and assets is called fingerprinting. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
32
A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
33
A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
35
The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) server-based IDPS protects the server or host's information assets. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) event is an indication that a system has just been attacked or is under attack. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
38
The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
39
Passive scanners are advantageous in that they require vulnerability analysts to get approval prior to testing.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
40
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
41
__________ is the process of classifying IDPS alerts so that they can be more effectively managed.

A) Alarm filtering
B) Alarm clustering 
C) Alarm compaction
D) Alarm attenuation
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
42
When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
43
For Linux or BSD systems, a tool called "Snow White" allows a remote individual to "mirror" entire Web sites. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
44
A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
45
A(n) __________ is an event that triggers an alarm when no actual attack is in progress.

A) false neutral
Attack stimulus 
C) false negative
D) noise
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
46
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) __________ IDPS is focused on protecting network information assets.

A) network-based
B) host-based 
C) application-based
D) server-based
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
48
A(n) log file monitor is similar to an NIDPS. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
49
A padded cell is a hardened honeynet. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
50
Activities that scan network locales for active systems and then identify the network services offered by the host systems are known as __________.

A) port knocking
B) doorknob rattling 
C) footprinting
D) fingerprinting
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
51
The disadvantages of using the honeypot or padded cell approach include the fact that the technical ​implications of using such devices are not well understood. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
52
A wireless security toolkit should include the ability to sniff wireless traffic, scan wireless hosts, and assess the level of privacy or confidentiality afforded on the wireless network. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
53
Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

A) prevention
B) reaction 
C) detection
D) correction
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) __________ works like a burglar alarm in that it detects a violation (some system activities analogous to an opened or broken window) and activates an alarm.

A) IDPS
B) WiFi 
C) UDP
D) DoS
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
55
A(n) port is the equivalent of a network channel or connection point in a data communications system. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
56
Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
57
The primary advantages of a centralized IDPS control strategy are cost and ease of use. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
58
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
59
Port explorers are tools used both by attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
60
Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
61
The ability to detect a target computer's __________ is very valuable to an attacker.

A) manufacturer
B) operating system  
C) peripherals
D) BIOS
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
62
Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as network-based IDPSs.

A) passive
B) active 
C) reactive
D) dynamic
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
63
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.

A) inline
B) offline 
C) passive
D) bypass
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following ports is commonly used for the HTTP protocol  

A) 20
B) 25 
C) 53
D) 80
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
65
In TCP/IP networking, port __________ is not used.

A) 0
B) 1 
C) 13
D) 1023
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
66
Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.

A) LFM
B) stat IDPS 
C) AppIDPS
D) HIDPS
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
67
A(n) __________ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

A) packet scanner
B) packet sniffer 
C) honeypot
D) honey packet
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
68
__________ are usually passive devices and can be deployed into existing networks with little or no disruption to normal network operations.

A) NIDPSs
B) HIDPSs 
C) AppIDPSs
D) SIDPSs
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
69
A __________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

A) passive
B) aggressive 
C) active
D) secret
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
70
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.

A) vulnerabilities
B) fingerprints 
C) signatures
D) footprints
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
71
__________ testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

A) Buzz
B) Fuzz 
C) Spike
D) Black
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
72
__________ is the action of luring an individual into committing a crime to get a conviction.

A) Entrapment
B) Enticement 
C) Intrusion
D) Padding
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is NOT a described IDPS control strategy  

A) centralized
B) fully distributed 
C) partially distributed
D) decentralized
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
74
A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device.

A) NIDPS
B) SPAN 
C) DPS
D) IDSE
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
75
Some vulnerability scanners feature a class of attacks called _________, that are so dangerous they should only be used in a lab environment.

A) aggressive
B) divisive 
C) destructive
D) disruptive
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
76
To use a packet sniffer legally, the administrator must __________.

A) be on a network that the organization owns
B) be under direct authorization of the network's owners 
C) have knowledge and consent of the content's creators
D) All of the above
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
77
__________ are decoy systems designed to lure potential attackers away from critical systems.

A) Honeypots
B) Bastion hosts 
C) Wasp nests
D) Designated targets
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
78
A(n) ____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
79
__________ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files.

A) NIDPSs
B) HIDPSs 
C) AppIDPSs
D) SIDPSs
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
80
__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.

A) Honeynet
B) Trap-and-trace 
C) HIDPS
D) Packet sniffer
Unlock Deck
Unlock for access to all 107 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 107 flashcards in this deck.