Home Uncategorised Network Security Specialist – Intrusion-Detection Systems Quiz Answers

Network Security Specialist – Intrusion-Detection Systems Quiz Answers

176
0

Question: What is a profiling technique that monitors how applications use resources called?

  • System monitoring
  • Resource profiling
  • Application monitoring
  • Executable profiling

Question: What is an attempt to attract intruders to a system setup for monitoring them called?

  • Intrusion deterrence
  • Intrusion detection
  • Intrusion banishment
  • Intrusion routing

Question: Which of the following is NOT a profiling strategy used in anomaly detection?

  • Threshold monitoring
  • Resource profiling
  • Executable profiling
  • System monitoring

Question: What could a series of ICMP packets sent to your ports in sequence indicate?

  • A DoS attack
  • A ping flood
  • A packet sniffer
  • A port scan

Question: Specter is an advanced IDS system

  • True
  • False

Question: What type of IDS is Snort?

  • Router based
  • Operating system based
  • Host based
  • Client based

Question: What is a system that is setup for attracking and monitoring intruders called?

  • Fly paper
  • Trap door
  • Honeypot
  • Hacker cage

Question: IDS is an acronym for:

  • Intrusion-detection system
  • Intrusion-deterrence system
  • Intrusion-deterrence service
  • Intrusion detection service

Question: What is another term for preemptive blocking?

  • Intrusion detection
  • Intrusion detection
  • User deflection
  • Intruder blocking

Question: Specter aggressive mode tries to trace the attacker and gain its identity

  • True
  • False

LEAVE A REPLY

Please enter your comment!
Please enter your name here