Review 11 Flashcards

(15 cards)

1
Q

What term describes a software program or hardware appliance that monitors network traffic and creates an alert when it encounters a suspicious activity or known threat.

Question options:

Honeypot

IPS

IDS

Firewall

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term describes a software program or hardware appliance that monitors network traffic and takes action to prevent harmful events.

Question options:

Honeypot

IPS

Firewall

IDS

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most effective firewall evasion technique?

Question options:

Fragmentation

HTTP Tunneling

Spoofing

Source Routing

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of system is more difficult to manage since it has to be maintained individually on each system?

Question options:

Honeypot

NIDS

Firewall

HIDS

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To avoid a _________ IDS, you should design the threat to capitalize on weaknesses of the IDS.

Question options:

signature-based

protocol-based

application-based

anomaly-based

A

signature-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of IDS alert occurs when an alarm was generated, and no condition was present to generate it?

Question options:

True-Negative

True-Positive

False-Positive

False-Negative

A

False-Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of IDS compares network behavior to baseline profiles or network behavior baselines?

Question options:

Anomaly-based

Application-based

Signature-based

Protocol-based

A

Anomaly-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT the role of an IDS?

Question options:

Analyze network traffic

Monitor log files

Monitor application execution

Check file integrity

A

Monitor application execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________ are physical devices usually placed at the junction or gateway between two networks, usually a private network and a public network, such as the internet.

Question options:

HIDS

NIDS

Software firewalls

Hardware firewalls

A

Hardware firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of attack changes the malicious code with the intent to disguise it as legitimate?

Question options:

DoS or DDoS attack

Insertion attack

Obfuscation attack

Payload attack

A

Obfuscation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following should be avoided in order to avoid detection by a HIDS?

Question options:

Unknown files inserted into the system

Unknown or unexplained messages and warnings in log files

New and/or unusual ports being used or open

New and/or unusual protocols and services being used

A

Unknown files inserted into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which firewall evasion method can bypass firewalls and may be one of the easiest tunneling methods to use because the protocol is already allowed through many firewalls as part of normal operations.

Question options:

Source Routing

ICMP Tunneling

Spoofing

HTTP Tunneling

A

HTTP Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The logging capability of a __________ is far greater than other network security tools. It captures raw, packet-level data, including the keystrokes and mistakes made by attackers.

Question options:

IPS

honeypot

IDS

firewall

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is one of the most familiar attacks on a network or system?

Question options:

Insertion attack

Obfuscation attack

DoS or DDoS attack

Payload attack

A

DoS or DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which type of technology utilizes encryption to offer secure connectivity between many entities, both internally and remotely?

Question options:

VPN

Gateway

Firewall

HIDS

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly