5-4 Flashcards

1
Q

a software honeypot solution. comprised of a dedicated pc with the _________ program running. can emulate the major internet protocols thus appearing to be a fully functional server

A

Specter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

specter works by runnning a number of _________ common to a network serers

A

services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

specter logs all trafficto the server for analysis. user can set it up in one of 5 modes

A
open
secure
failing
strange
aggressive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

on this mode the system behaves lika a badly configured server in terms of security. the downside of this mode is that you are most likely to attract and catch the least skillful hacker

A

Specter open mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this mode had the system behaving like secure server

A

Specter secure mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

this mode is interesting in that it causes the system to behave like a server with various hardware and software problems. this might attract some hakers because such a system is likely to be vulnerable

A

Specter failing mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

in this mode the system behaves in unpredictable ways. this sort of behavior is likely to attract the attention of a more talented hacker and perhaps cause her tostay online longer to figure out what is going on. the longer the hacker stays connected the better the chance of tracing her.

A

Specter strange mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this mode causesthe system to actively try and trace back the intruder and derive his identity. this mode is most useful for catching the intruder.

A

aggrassive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 ways to configure fake passsword file in specter

A
easy
normal
hard
fun
warning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the first symantec product was a ________

A

decoy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this product simulated being a real server by simulating many server functions such as incoming and outgoing traffic

A

symantec decoy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the decoy server serves as a honeypot and an __________

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an atempt is made to attract the intruder to a subsystem set up for the purpose of obvseving him

A

intrusion deflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

involves simply trying to make the system seem like a less palatable taget

A

intrusion deterrence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly