Deck 2: DNS, IDS/IPS, and Digital Investigations
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
Play
Full screen (f)
Deck 2: DNS, IDS/IPS, and Digital Investigations
1
DNS can use services of________using the well known port 53
A)udp
B)tcp
C)either (a) or (b)
D)none of the above
A)udp
B)tcp
C)either (a) or (b)
D)none of the above
either (a) or (b)
2
In the DNS the names are defined in _____ sturucture
A)a linear list
B)an invertred tree
C)a graph
D)none
A)a linear list
B)an invertred tree
C)a graph
D)none
an invertred tree
3
The root of DNS tree is____
A)a string of characters
B)a string of 63 characters
C)an empty string
D)none
A)a string of characters
B)a string of 63 characters
C)an empty string
D)none
an empty string
4
A full domain name is sequence of lables seperated by____
A)semicolons
B)dots
C)colons
D)none
A)semicolons
B)dots
C)colons
D)none
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
When discussing IDS/IPS, what is a signature?
A)an electronic signature used to authenticate the identity of a user on the network
B)patterns of activity or code corresponding to attacks
C)"normal," baseline network behavior
D)none of the above
A)an electronic signature used to authenticate the identity of a user on the network
B)patterns of activity or code corresponding to attacks
C)"normal," baseline network behavior
D)none of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
Which is true of a signature-based IDS?
A)it cannot work with an ips
B)it only identifies on known signatures
C)it detects never-before-seen anomalies
D)it works best in large enterprises.
A)it cannot work with an ips
B)it only identifies on known signatures
C)it detects never-before-seen anomalies
D)it works best in large enterprises.
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
A false positive can be defined as:
A)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
B)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity
C)the lack of an alert for nefarious activity
D)all of the above
A)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
B)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity
C)the lack of an alert for nefarious activity
D)all of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
The features of traditional IPSes are found in all of these modern systems, except:
A)next-generation firewalls
B)antimalware
C)unified threat management appliances
D)network behavior analysis systems
A)next-generation firewalls
B)antimalware
C)unified threat management appliances
D)network behavior analysis systems
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
How does machine learning benefit IDSes/IPSes?
A)by lowering the volume of attacks analyzed
B)by adding heuristic anomaly detection capabilities
C)by searching for similar patterns to known attacks
D)by helping identify signatures more quickly
A)by lowering the volume of attacks analyzed
B)by adding heuristic anomaly detection capabilities
C)by searching for similar patterns to known attacks
D)by helping identify signatures more quickly
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck