Question 1: What is a profiling technique that monitors how applications use resources called?
- System monitoring
- Resource profiling
- Application monitoring
- Executable profiling
Question 2: What is an attempt to attract intruders to a system setup for monitoring them called?
- Intrusion deterrence
- Intrusion detection
- Intrusion banishment
- Intrusion routing
Question 3: Which of the following is NOT a profiling strategy used in anomaly detection?
- Threshold monitoring
- Resource profiling
- Executable profiling
- System monitoring
Question 4: What could a series of ICMP packets sent to your ports in sequence indicate?
- A DoS attack
- A ping flood
- A packet sniffer
- A port scan
Question 5: Specter is an advanced IDS system
- True
- False
Question 6: What type of IDS is Snort?
- Router based
- Operating system based
- Host based
- Client based
Question 7: What is a system that is setup for attracking and monitoring intruders called?
- Fly paper
- Trap door
- Honeypot
- Hacker cage
Question 8: IDS is an acronym for:
- Intrusion-detection system
- Intrusion-deterrence system
- Intrusion-deterrence service
- Intrusion detection service
Question 9: What is another term for preemptive blocking?
- Intrusion detection
- Intrusion detection
- User deflection
- Intruder blocking
Question 10: Specter aggressive mode tries to trace the attacker and gain its identity
- True
- False