Chapter 4 Flashcards

(48 cards)

1
Q

Intrusion detection systems (IDSs) monitor:

A

a network and send alerts

when they detect suspicious events on a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Intrusion
prevention systems (IPSs) react:
A

to attacks in progress and prevent them from

reaching systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A host-based intrusion detection system (HIDS) is:

A

additional software

installed on a system such as a workstation or server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A host-based intrusion detection system (HIDS) provides:

A

protection to
the individual host and can detect potential attacks and protect critical
operating system files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The primary goal of any IDS is to

A

monitor traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For a HIDS, traffic passes through:

A

the network interface card (NIC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Many host-based IDSs have expanded to:

A

monitor application activity on
the system.

monitor the server application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You can install a HIDS on different:

A

Internet facing servers, such as web servers, mail servers, and database servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A HIDS can help detect:

A

malicious software

(malware)that traditional antivirus software might miss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A network-based intrusion detection system (NIDS) monitors:

A

activity

on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An administrator installs NIDS sensors or collectors on:

A

network devices such as routers and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NIDS sensors or collectors gather:

A

information and report to a central monitoring server hosting a NIDS console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A NIDS is not able to:

A

detect anomalies on individual systems or
workstations unless the anomaly causes a significant difference in network traffic.

decrypt encrypted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The NIDS provides overall:

A

monitoring and

analysis and can detect attacks on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most

switches support:

A

port mirroring, allowing administrators to configure the switch to send all traffic received by the switch to a single port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After configuring a port mirror, you can use it as a:

A

tap to send all switch data to a sensor or collector, and forward this to a NIDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

it’s possible to

configure taps on routers to:

A

capture all traffic sent through the switch and

send it to the IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The decision on where you want to place the sensors depends on:

A

what you want to measure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you want to see all attacks on your network, put a sensor on:

A

the Internet side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If you only want to see what gets through your network, put sensors:

A

internally only.

21
Q

If you want to see both attacks on and through your network, put sensors in:

22
Q

An IDS can only:

A

detect an attack.

23
Q

An IPS prevents attacks by:

A

detecting them and stopping them before they

reach the target.

24
Q

An attack is:

A

any attempt to compromise confidentiality,

integrity, or availability.

25
The two primary methods of detection are:
signature-based heuristic- or behavioral- based (also called anomaly-based).
26
Any type of IDS can detect:
attacks based on signatures, anomalies, or both.
27
The HIDS monitors:
the network traffic reaching its NIC and the NIDS monitors the traffic on the network.
28
Signature-based IDSs (also called definition-based) use:
a database of known vulnerabilities or known attack patterns.
29
Heuristic/behavioral-based detection (also called anomaly-based detection) starts by:
identifying normal operation or normal behavior of the | network
30
Heuristic/behavioral-based detection (also called anomaly-based detection) identifies normal operation by:
creating a performance baseline under normal | operating conditions.
31
The IDS provides continuous monitoring:
by constantly comparing | current network behavior against the baseline.
32
``` When the IDS detects abnormal activity (outside normal boundaries as identified in the baseline), it: ```
gives an alert indicating a potential attack.
33
Both heuristic-based antivirus software examine:
activity and detect abnormal activity that is beyond the capability of signature based detection.
34
The SYN flood attack is a:
common denial-of-service | (DoS) attack
35
in a SYN flood attack, the attacker:
sends multiple SYN packets but never completes the third part of the TCP handshake with the last ACK packet.
36
Many firewalls include a | SYN flood guard that can:
detect SYN flood attacks and take steps to close the open sessions.
37
In some usage, administrators define a zero-day exploit as:
one where the vendor has not released a patch.
38
Any time administrators make any significant changes to a system or network that cause the normal behavior to change, they should:
re-create the baseline.
39
Any type of IDS will use:
various raw data sources to collect information | on activity including a wide variety of logs, such as firewall logs, system logs, and application logs.
40
Logs can be analyzed to provide:
insight on trends.
41
Trends can detect:
a pattern of attacks and provide insight into how to better protect a network
42
IDSs report on:
events of interest based on rules configured within the IDS. All events aren’t attacks or actual issues, but instead, they provide a report indicating an event might be an alert or an alarm.
43
Systems use an alarm for:
a potentially serious issue
44
Systems use an alert as:
a relatively minor issue.
45
Administrators configure the rules within the IDS based on:
the needs of the organization.
46
While IDSs use advanced analytics to examine traffic, they are susceptible to:
both false positives and false negatives.
47
A false positive is:
an alert or alarm on an event that is nonthreatening, benign, or harmless.
48
A false negative is:
when an attacker is actively attacking the network, but the system does not detect it.