Review 11 Flashcards
(15 cards)
What term describes a software program or hardware appliance that monitors network traffic and creates an alert when it encounters a suspicious activity or known threat.
Question options:
Honeypot
IPS
IDS
Firewall
IDS
What term describes a software program or hardware appliance that monitors network traffic and takes action to prevent harmful events.
Question options:
Honeypot
IPS
Firewall
IDS
IPS
What is the most effective firewall evasion technique?
Question options:
Fragmentation
HTTP Tunneling
Spoofing
Source Routing
Spoofing
Which type of system is more difficult to manage since it has to be maintained individually on each system?
Question options:
Honeypot
NIDS
Firewall
HIDS
HIDS
To avoid a _________ IDS, you should design the threat to capitalize on weaknesses of the IDS.
Question options:
signature-based
protocol-based
application-based
anomaly-based
signature-based
Which type of IDS alert occurs when an alarm was generated, and no condition was present to generate it?
Question options:
True-Negative
True-Positive
False-Positive
False-Negative
False-Positive
Which type of IDS compares network behavior to baseline profiles or network behavior baselines?
Question options:
Anomaly-based
Application-based
Signature-based
Protocol-based
Anomaly-based
Which of the following is NOT the role of an IDS?
Question options:
Analyze network traffic
Monitor log files
Monitor application execution
Check file integrity
Monitor application execution
___________ are physical devices usually placed at the junction or gateway between two networks, usually a private network and a public network, such as the internet.
Question options:
HIDS
NIDS
Software firewalls
Hardware firewalls
Hardware firewalls
Which type of attack changes the malicious code with the intent to disguise it as legitimate?
Question options:
DoS or DDoS attack
Insertion attack
Obfuscation attack
Payload attack
Obfuscation attack
Which of the following should be avoided in order to avoid detection by a HIDS?
Question options:
Unknown files inserted into the system
Unknown or unexplained messages and warnings in log files
New and/or unusual ports being used or open
New and/or unusual protocols and services being used
Unknown files inserted into the system
Which firewall evasion method can bypass firewalls and may be one of the easiest tunneling methods to use because the protocol is already allowed through many firewalls as part of normal operations.
Question options:
Source Routing
ICMP Tunneling
Spoofing
HTTP Tunneling
HTTP Tunneling
The logging capability of a __________ is far greater than other network security tools. It captures raw, packet-level data, including the keystrokes and mistakes made by attackers.
Question options:
IPS
honeypot
IDS
firewall
honeypot
What is one of the most familiar attacks on a network or system?
Question options:
Insertion attack
Obfuscation attack
DoS or DDoS attack
Payload attack
DoS or DDoS attack
Which type of technology utilizes encryption to offer secure connectivity between many entities, both internally and remotely?
Question options:
VPN
Gateway
Firewall
HIDS
VPN