4 Security Applications and Device Flashcards
Which operating system utilizes the PF and IPFW firewall
OS X
Which operating system utilizes the iptables firewall
Linux
What is a monitoring system that detects suspicious actives and generates alerts when they are detected
Intrusion Detection System (IDS)
What are the two types of IDS’s
Host-based IDS and Network-based IDS
What is a host based ids
it monitors the computer infrastructure on which it is installed, analyzing traffic and logging malicious behavior
what is a network based ids
devices intelligently distributed within networks that passively inspect traffic traversing the devices on which they sit
What are the three types of detection methods in an IDS
signature based, policy based, and anomaly based
What is signature based detection method in an IDS
A specific string or byte triggers an alert
What is policy based detection method in an IDS
relies on specific declaration of the security policy
What is anomaly based detection method in an IDS
Analyzes the current traffic against an established baseline and triggers an alert if outside the statistical average
What is malicious activity is identified as an attack:
A. True Positive
B. False Positive
C. True Negative
D. False Negative
A. True Positive
What is legitimate activity is identified as an attack
A. True Positive
B. False Positive
C. True Negative
D. False Negative
B. False Positive
What is legitimate activity is identified as legitimate traffic
A. True Positive
B. False Positive
C. True Negative
D. False Negative
C. True Negative
What is malicious activity identified as legitimate traffic
A. True Positive
B. False Positive
C. True Negative
D. False Negative
D. False Negative
What is the difference between an IDS and an IPS
An IDS detects and monitoring tools. Tools do not take action on their own. Requires human interaction. An IPS is a control system. They accept or rejects packets based on the ruleset. Require that the database gets updated regulated with new thread data.