Intrusion Detection Flashcards
_______ tries to stop intrusion from happening(Firewall or IDS)
firewallP2 L4
_______ tries to evaluate an intrusion after it has happened(Firewall or IDS)
IDSP2 L4
_______ watches for intrusions that start within the system(Firewall or IDS)
IDSP2 L4
_______ limits access between networks to prevent intrusion
FirewallP2 L4
An intruder can also be referred to as a hacker or cracker
trueP2 L4
Activists are either individuals or members of an organized crime group with a goal of financial reward
falseP2 L4
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion
trueP2 L4
Those who hack into computer do so for the thrill of it or for status
falseP2 L4
Intruders typically use steps from a common attack methodology
trueP2 L4
This backdoor is hard to detect because it modifies machine code
Object code backdoorsP2 L4
This backdoor can only be used by the person who created it, even if it is discovered by others
Asymmetric backdoorsP2 L4
This backdoor inserts backdoors into other programs during compilation
Compiler backdoorsP2 L4
The longer an anomaly detection system is in use, the more it learns about network activity
trueP2 L4
If malicious activity looks like normal traffic to the anomaly detection system, it will not detect an attack
trueP2 L4
False positives from an anomaly detection system can become a problem, normal usage can be mistaken for an attack
trueP2 L4
With signature based detection, new threats can be detected immediately
falseP2 L4
With signature based detection, when a new virus is identified, it must be added to the signature databases
trueP2 L4
Signature-based detection systems can only detect an intrusion attempt if it matches a pattern that is in the database
trueP2 L4
Which of the following could be considered an anomaly to a typical networkA) An IP addressB) A port addressC) Packet lengthD) Flag setting
All of themP2 L4
with _________, any action that does not fit the normal behavior profile is considered an attack
statistical intrusion detectionP2 L4
with _________, any action that is not classified as normal is considered to be an attack
knowledge based intrusion detectionP2 L4
_______ anomaly detection detects attacks similar to past attacks
machine learning intrusion detectionP2 L4
One of the weaknesses of anomalous intruder detection is that a system must learn what is normal behavior. WHile it is learning this, the network is vulnerable to attack. What can be done to mitigate this weakness?
use a firewall.P2 L4
In the thriving 0-day attack marketplace hackers sell information on software vulnerabilities. Can you guess some of the buyers?A) AppleB) Google C) Microsoft,D) U.S. Government
allP2 L4