Chapter 15: Threat Identification and Prevention Flashcards
Understand Network Threats and Attacks
Modern {blank} protects against viruses, worms, Trojan horses, and other types of malicious codes.
Antivirus software
What are the mechanisms used by antivirus software to protect systems against malicious software?
- Signature detection
- Behavior detection
{Blank} uses databases of known malware patterns and scans the files and memory of a system for any data matching the pattern of know malicious software.
Signature detection
Instead of using patterns of known malicious activity, these systems attempt to model normal activity and then report when they discover anomalies (activities that deviates from that normal pattern).
Behavior detection
{Blank} monitor an environment for signs of malicious activity and report the activity to adminstrators.
Intrusion Detection Systems
{Blank} monitor an environment for signs of malicious activity and attempt to actually black the activity.
Intrusion Prevention Systems
{Blank} intrusion detection and prevention systems monitor and protect individual devices like computers and servers. They analyze the system’s files and operations to detect suspicious activities or unauthorized changes.
Host-based
{Blank} intrustion detection and prevention systems focus on safeguarding the entire network. They monitor network taffic and analyze packets to detect and prevent malicious activities or intrusions that could harm the network as a whole.
Network-based
{Blank} serve as the security guards of a network, analyzing all attempts to connect to systems on a network and determining whether the request should be allowed or denied according to the organization’s security policy.
Network firewalls
Tara recently analyzed the results of a vulnerability scan report and found that a vulnerability reported by the scanner did not exist because the system was actually patched as specified. Which type of error occur?
A. False positive
B. False negative
C. True positive
D. True negative
False positive
Valerie recently installed a new device on her network that monitors traffic that passes through the organization’s firewall and blocks any traffic that appears to contain malicious attacks. Which type of system has she installed?
A. HIPS
B. HIDS
C. NIPS
D. NIDS
NIPS