5-1 Flashcards

1
Q

an intrusion detection strategy that depends on detecting anomalous activities

A

anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

blocking all traffic from a suspect IP address

A

banishment vigilance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a type of intrusion detection strategy that seeks to profile the behavior of legitimate executables and compare that against the activity of any running program

A

executable profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an erroneous flagging of legitimate activity as an attempted intrusion by an IDS

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

one who tries to learn about a system by examining and reverse engineering it

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a system or server designed to be very appealing to hackers, when in fact it is a trap to catch them

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the act of gaining access to secure portions of a network

A

intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an ids strategy that is dependent upon making the system seem less attractive to intruders. it seeks to deflect attention away from the system

A

intrusion deflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a system for detecting attempted intrusions. related to intrusion prevention systems that block suspected attacks

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an ids strategy that attempts to deter intruders by making the system seem formidable, perhaps more formidable that it is

A

intrusion deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a firewall solution that runs on an existing server

A

network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

detecting any attempted intrusion throughout the network, as opposed to intrusion detection that only works on a single machine or server

A

network intrusion detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sequentially pinging ports to see which ones are active

A

port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

monitoring approach that measures the system-wide use of resources and develops a historic usable profile

A

resource profiling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a widely-used open source intrusion detection system

A

snort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

monitoring a network or system looking for any activity that exceeds some predefined limit or threshold

A

threshold monitoring

17
Q

the act of gaining access to secure portions of a network

A

infiltration