Filters
Question type

Study Flashcards

When the measured activity is outside the baseline parameters - exceeding what is called the ____ - the IDPS sends an alert to the administrator.


A) baseline
B) clipping level
C) radius
D) sensor range

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Blacklists and whitelists are most commonly used in ____ detection and stateful protocol analysis.


A) blacklist
B) signature-based
C) statistical anomaly-based
D) behavior-based

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Define enticement and entrapment and compare the two.

Correct Answer

verifed

verified

Enticement is the process of attracting ...

View Answer

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -The process of reducing IDPS events in order to receive a better confidence in the alerts received.

Correct Answer

verifed

verified

____ applications use a combination of techniques to detect an intrusion and trace it back to its source.


A) Trap-and-trace applications
B) Honeynet
C) Behavior-based
D) Statistical anomaly-based

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What does the tcpdump host 192.168.1.100 command do?


A) It only captures traffic originating from and destined to 192.168.1.100.
B) It only captures traffic originating from 192.168.1.100.
C) It only captures traffic destined to 192.168.1.100.
D) It only captures traffic destined to the default host 192.168.1.1.

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

A

List four problems a wireless IDPS can help detect.

Correct Answer

verifed

verified

Wireless IDPS can help detect:
blured imageUnauthori...

View Answer

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -The failure of an IDPS to react to an actual attack event.

Correct Answer

verifed

verified

E

The Simple Network Management Protocol contains ____ functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.


A) log
B) trap
C) evidentiary packet dump
D) e-mail message

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

List three disadvantages of using a honeypot approach.

Correct Answer

verifed

verified

The disadvantages of using a honeypot approach are: \(\bullet\)The legal implications of using such devices are not well defined. \(\bullet\)An expert attacker, once diverted into a decoy system, may become angry and launch a more hostile attack against an organization's systems. \(\bullet\)Administrators and security managers need a high level of expertise to use these systems. \(\bullet\)Administrators should also be wary of the wasp trap syndrome. In this syndrome, a concerned homeowner installs a wasp trap in his backyard to trap the few insects he sees flying about. Because these traps use scented bait, however, they wind up attracting far more wasps than were originally present. Security administrators should keep the wasp trap syndrome in mind before implementing honeypots. \(\bullet\)Special care must be taken in order to ensure that a honeypot cannot be compromised in a way that could lead to further attacks on your networks or systems.

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a ____.


A) nest
B) web
C) honeynet
D) tunnel

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

The first hurdle a potential IDPS must clear is functioning in your systems environment.

A) True
B) False

Correct Answer

verifed

verified

A sniffer can decipher encrypted traffic.

A) True
B) False

Correct Answer

verifed

verified

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -The process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing both false positives and false negatives.

Correct Answer

verifed

verified

Under the guise of justice, some less scrupulous administrators may even be tempted to ____, or hack into a hacker's system to find out as much as possible about the hacker.


A) reverse hack
B) back hack
C) white hack
D) transpose

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -A value that sets the limit between normal and abnormal behavior.

Correct Answer

verifed

verified

List three advantages of operational NIDPSs.

Correct Answer

verifed

verified

Advantages of operational NIDPSs include...

View Answer

By default, tcpdump will just print ____ information.


A) source
B) destination
C) packet header
D) packet contents

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Match each item with a statement below. a.Alert f.False positive b.Confidence g.Filtering c.Evasion h.Tuning d.Events i.Thresholds e.False negative -An alert or alarm that occurs in the absence of an actual attack.

Correct Answer

verifed

verified

Which tcpdump option specifies the number of packets to capture?


A) -i
B) -c
C) -p
D) -n

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer