Intrusion Detection Systems Flashcards

(20 cards)

1
Q

An IDS is a cybersecurity tool that monitors network traffic and devices for _________ or _________ activity.

A

suspicious; malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_________-based IDS monitors network traffic for multiple hosts connected to a network segment.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDSs send alerts to security teams or a centralized security tool, such as a _________ system

A

security information and event management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_________-based detection methods use machine learning to identify anomalous behavior in network data and traffic.

A

Anomaly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDSs can be integrated with _________, which can automatically stop detected threats.

A

intrusion prevention systems (IPSs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an intrusion detection system (IDS)?

A

A cybersecurity tool that monitors network traffic and devices for suspicious or malicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a network-based IDS?

A

An IDS that monitors network traffic for multiple hosts connected to a network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a signature-based detection method?

A

A detection method that monitors for specific patterns and sequences that match known attack signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of a host-based IDS?

A

An IDS that operates on information collected from within a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main challenge of using IDSs?

A

They can produce false positives and false negatives, making it challenging for organizations to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_________-based IDS protects data, resources, and systems in cloud environments.

A

Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Signature-based detection monitors for specific _________ and _________ that match known attack signatures

A

patterns; sequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IDS may generate _________ positives, which are alerts triggered by non-threatening activity.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDSs can send alerts to a centralized security tool, such as a _________ system.

A

SIEM (security information and event management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a cloud-based IDS?

A

An IDS that protects data, resources, and systems in cloud environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an anomaly-based detection method?

A

A detection method that uses machine learning to analyze network data and identify anomalous behavior.

17
Q

What is the role of an IDS in cyber hygiene?

A

To monitor for threats as part of overall cybersecurity practices, though it cannot stop threats on its own.

18
Q

What is a false negative in the context of an IDS?

A

When an IDS fails to detect a genuine threat, leading to no alert being issued.

19
Q

What is an intrusion prevention system (IPS)?

A

A system that can automatically stop detected threats, often integrated with an IDS.

20
Q

IDSs are a fundamental part of cyber hygiene, but they can’t _________ security threats on their own.