Intrusion Detection Flashcards

1
Q

_______ tries to stop intrusion from happening(Firewall or IDS)

A

firewallP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ tries to evaluate an intrusion after it has happened(Firewall or IDS)

A

IDSP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ watches for intrusions that start within the system(Firewall or IDS)

A

IDSP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______ limits access between networks to prevent intrusion

A

FirewallP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An intruder can also be referred to as a hacker or cracker

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activists are either individuals or members of an organized crime group with a goal of financial reward

A

falseP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Those who hack into computer do so for the thrill of it or for status

A

falseP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intruders typically use steps from a common attack methodology

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This backdoor is hard to detect because it modifies machine code

A

Object code backdoorsP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This backdoor can only be used by the person who created it, even if it is discovered by others

A

Asymmetric backdoorsP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This backdoor inserts backdoors into other programs during compilation

A

Compiler backdoorsP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The longer an anomaly detection system is in use, the more it learns about network activity

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If malicious activity looks like normal traffic to the anomaly detection system, it will not detect an attack

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

False positives from an anomaly detection system can become a problem, normal usage can be mistaken for an attack

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

With signature based detection, new threats can be detected immediately

A

falseP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

With signature based detection, when a new virus is identified, it must be added to the signature databases

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Signature-based detection systems can only detect an intrusion attempt if it matches a pattern that is in the database

19
Q

Which of the following could be considered an anomaly to a typical networkA) An IP addressB) A port addressC) Packet lengthD) Flag setting

A

All of themP2 L4

20
Q

with _________, any action that does not fit the normal behavior profile is considered an attack

A

statistical intrusion detectionP2 L4

21
Q

with _________, any action that is not classified as normal is considered to be an attack

A

knowledge based intrusion detectionP2 L4

22
Q

_______ anomaly detection detects attacks similar to past attacks

A

machine learning intrusion detectionP2 L4

23
Q

One of the weaknesses of anomalous intruder detection is that a system must learn what is normal behavior. WHile it is learning this, the network is vulnerable to attack. What can be done to mitigate this weakness?

A

use a firewall.P2 L4

24
Q

In the thriving 0-day attack marketplace hackers sell information on software vulnerabilities. Can you guess some of the buyers?A) AppleB) Google C) Microsoft,D) U.S. Government

25
with a(n) _______ attack, an attacker sends various kinds of packets to probe a system or network for vulnerability that can be exploited
scanning attackP2 L4
26
with a(n) _______ attack, the attack attempts to slow down or completely shut down a target so as to disrupt the service for legitimate users
DOSP2 L4
27
with a(n) _______ attack, an attacker gains unauthorized control of a system
penetrationP2 L4
28
Can you think of a way to reduce the impact of excessive reporting on a system's administrator?
Prioritize the alertsP2 L4
29
Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified
trueP2 L4
30
The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts.
trueP2 L4
31
Signature-based approaches attempt to define normal, or expected, behavior, whereas anomaly approaches attempt to define proper behavior
falseP2 L4
32
A network IDS sensor monitors a copy of network traffic, the actual traffic does not pass through the devices
trueP2 L4
33
Network-based intrusion detection can make use of signature detection and anomaly detection
trueP2 L4
34
When using sensors, which of the following is considered good practice?A) Set the IDS level to the highest sensitivity to detect every attackB) Monitor both outbound and inbound trafficC) Use a shared network resource to gather NIDS dataD) NIDS sensors are not turnkey solutions, system administrators must interpret alerts
B) monitor both outbound and inbound trafficD) NIDS sensors are not turnkey solutions, system administrators must interpret alertsP2 L4
35
A common location for a NIDS sensor is just inside the external firewall
trueP2 L4
36
A honeypot can be a workstation that a user uses for work
falseP2 L4
37
There is no benefit of deploying a NIDS or honeypot outside of the firewall
falseP2 L4
38
To improve detection performance, an IDS should reduce false alarm rate while detecting as many intrusions as possible
trueP2 L4
39
to improve detection performance, an IDS should apply detection models at all unfiltered packet data directly.
falseP2 L4
40
to improve detection performance, an IDS should apply detection models at processed event data that has higher base rate
trueP2 L4
41
To defeat an IDS, attackers can send a huge amount of traffic
trueP2 L4
42
To defeat an IDS, attackers can embed attack in packets which cause non-uniform processing by different operating systems, e.g. bad checksum, overlapping fragments
trueP2 L4
43
To defeat an IDS, attackers can send traffic that purposely matches detection rules
trueP2 L4
44
To defeat an IDS, attackers can send a packet that would trigger a buffer-overload in the IDS code
true P2 L4