Deck 2: DNS, IDS/IPS, and Digital Investigations

Full screen (f)
exit full mode
Question
DNS can use services of________using the well known port 53

A)udp
B)tcp
C)either (a) or (b)
D)none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
In the DNS the names are defined in _____ sturucture

A)a linear list
B)an invertred tree
C)a graph
D)none
Question
The root of DNS tree is____

A)a string of characters
B)a string of 63 characters
C)an empty string
D)none
Question
A full domain name is sequence of lables seperated by____

A)semicolons
B)dots
C)colons
D)none
Question
When discussing IDS/IPS, what is a signature?

A)an electronic signature used to authenticate the identity of a user on the network
B)patterns of activity or code corresponding to attacks
C)"normal," baseline network behavior
D)none of the above
Question
Which is true of a signature-based IDS?

A)it cannot work with an ips
B)it only identifies on known signatures
C)it detects never-before-seen anomalies
D)it works best in large enterprises.
Question
A false positive can be defined as:

A)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
B)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity
C)the lack of an alert for nefarious activity
D)all of the above
Question
The features of traditional IPSes are found in all of these modern systems, except:

A)next-generation firewalls
B)antimalware
C)unified threat management appliances
D)network behavior analysis systems
Question
How does machine learning benefit IDSes/IPSes?

A)by lowering the volume of attacks analyzed
B)by adding heuristic anomaly detection capabilities
C)by searching for similar patterns to known attacks
D)by helping identify signatures more quickly
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/9
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: DNS, IDS/IPS, and Digital Investigations
1
DNS can use services of________using the well known port 53

A)udp
B)tcp
C)either (a) or (b)
D)none of the above
either (a) or (b)
2
In the DNS the names are defined in _____ sturucture

A)a linear list
B)an invertred tree
C)a graph
D)none
an invertred tree
3
The root of DNS tree is____

A)a string of characters
B)a string of 63 characters
C)an empty string
D)none
an empty string
4
A full domain name is sequence of lables seperated by____

A)semicolons
B)dots
C)colons
D)none
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
5
When discussing IDS/IPS, what is a signature?

A)an electronic signature used to authenticate the identity of a user on the network
B)patterns of activity or code corresponding to attacks
C)"normal," baseline network behavior
D)none of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
6
Which is true of a signature-based IDS?

A)it cannot work with an ips
B)it only identifies on known signatures
C)it detects never-before-seen anomalies
D)it works best in large enterprises.
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
7
A false positive can be defined as:

A)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
B)an alert that indicates nefarious activity on a system that, upon further inspection, turns out to truly be nefarious activity
C)the lack of an alert for nefarious activity
D)all of the above
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
8
The features of traditional IPSes are found in all of these modern systems, except:

A)next-generation firewalls
B)antimalware
C)unified threat management appliances
D)network behavior analysis systems
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
9
How does machine learning benefit IDSes/IPSes?

A)by lowering the volume of attacks analyzed
B)by adding heuristic anomaly detection capabilities
C)by searching for similar patterns to known attacks
D)by helping identify signatures more quickly
Unlock Deck
Unlock for access to all 9 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 9 flashcards in this deck.