Matching
Match the following terms to the appropriate definition.
Premises:
Records specific situations that an administrator wants to be warned about
Sends an alert to an administrator or takes an action to block an attack
Setting up ways to detect and record intrusion attempts, without taking action
A viewing capability that enables you to display only specific events
Used to attract attackers
Examines captured data and determines if there has been an intrusion
Performs a specific function when a predefined situation occurs
Used to detect and report possible network and computer system intrusions
Tracks a wide range of data and events related to an operating system
A message sent to an administrator about a specific operating system event
Responses:
Auditor
Passive intrusion detection
Filter
Decoy
Trigger
Inspector
Active intrusion detection
IDS
Alert
Trap
Correct Answer:
Premises:
Responses:
Records specific situations that an administrator wants to be warned about
Sends an alert to an administrator or takes an action to block an attack
Setting up ways to detect and record intrusion attempts, without taking action
A viewing capability that enables you to display only specific events
Used to attract attackers
Examines captured data and determines if there has been an intrusion
Performs a specific function when a predefined situation occurs
Used to detect and report possible network and computer system intrusions
Tracks a wide range of data and events related to an operating system
A message sent to an administrator about a specific operating system event
Premises:
Records specific situations that an administrator wants to be warned about
Sends an alert to an administrator or takes an action to block an attack
Setting up ways to detect and record intrusion attempts, without taking action
A viewing capability that enables you to display only specific events
Used to attract attackers
Examines captured data and determines if there has been an intrusion
Performs a specific function when a predefined situation occurs
Used to detect and report possible network and computer system intrusions
Tracks a wide range of data and events related to an operating system
A message sent to an administrator about a specific operating system event
Responses:
Related Questions
Q76: In Red Hat Linux, log files are
Q77: Host wrapper software, which may also be
Q78: A(n) _ is a command-line string issued
Q79: A(n) _ can be acquired by using
Q80: In Windows Server 2003, the _ log
Q82: What two purposes does a honeypot serve
Q83: What two useful tools does NetWare offers
Q84: In the Windows 2000 Computer Management tool,
Q85: List eight server monitoring functions that can
Q86: What four tasks can be accomplished using
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents