Section 3.2 Host and Application Security Solutions Flashcards
Where should endpoint detection be focused?
Throughout the entire network
What monitors network activity for suspicious behavior and alerts if anything is found?
Intrusion Detection Systems (IDS)
What monitors network activity and attempts to deal with the issue and either disconnects suspicious connections or turn off attacked services?
Intrusion Prevention Systems (IPS)
What monitors network patterns and headers of network patches?
Network Intrusion Detection systems (NIDS)
What component of NIDS collect network data and sends it to the network monitor for analysis?
Detection Agent
What component of NIDS takes data from the detection agent, analyzes it, and sends warning notifications?
Network Monitor
What component of NIDS is used for notifications and alarms which are sent to the administrator?
Notification system
IDS’s are usually located where on the network?
A central point
What mode of IDS deployment analyzes all traffic?
In-band
What mode of IDS deployment only analyzes some of the traffic?
Out-of-band
What do you call a NIDS that uses active detection methods to take immediate steps to halt an intrusion?
NIPS
What prevention system reroutes network traffic in case of network attacks and terminates suspicious network activity?
NIPS
What is a disadvantage of active detection systems?
False positives can shut down the system
What kind of intrusion detection takes steps to mitigate an intrusion?
Active Intrusion Detection
What kind of intrusion detection typically logs the event or generates alarms?
Passive Intrusion Detection
What do you call a deep-packet inspection firewall that moves beyond port/protocol inspection and blocking?
Next Generation Firewall
What kind of monitoring systems contain signature databases that they use to detect attacks?
Signature-Based Monitoring
What kind of monitoring systems rely on the collective knowledge of security vendors but are unable to detect new attacks that haven’t been recorded?
Signature-Based Monitoring
What kind of monitoring systems use a known good baseline and looks for anomolies?
Behavior/Anomaly-Based Monitoring
What kind of monitoring systems are easily and quickly adapted to the environment and can detect new variants of attacks but take time to build a baseline profile?
Behavior/Anomaly-Based Monitoring
What kind of monitoring systems starts with an initial database of known attack types but changes its alert signatures based on learned behavior?
Heuristic-Based Monitoring
What do you call a type of attack that has rarely or never been encountered and takes advantage of previously unknown weaknesses and vulnerabilities in a software program or operating system?
A zero-day attack
What kind of monitoring systems relies on admin to create rules and determine consequences for breaking those rules?
Rule-based monitoring
What kind of monitoring systems require significant manual set-up and continuous updating?
Rule-based monitoring