Chapter 15: Threat Identification and Prevention Flashcards

Understand Network Threats and Attacks

1
Q

Modern {blank} protects against viruses, worms, Trojan horses, and other types of malicious codes.

A

Antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the mechanisms used by antivirus software to protect systems against malicious software?

A
  • Signature detection
  • Behavior detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

{Blank} uses databases of known malware patterns and scans the files and memory of a system for any data matching the pattern of know malicious software.

A

Signature detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Instead of using patterns of known malicious activity, these systems attempt to model normal activity and then report when they discover anomalies (activities that deviates from that normal pattern).

A

Behavior detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

{Blank} monitor an environment for signs of malicious activity and report the activity to adminstrators.

A

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

{Blank} monitor an environment for signs of malicious activity and attempt to actually black the activity.

A

Intrusion Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

{Blank} intrusion detection and prevention systems monitor and protect individual devices like computers and servers. They analyze the system’s files and operations to detect suspicious activities or unauthorized changes.

A

Host-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

{Blank} intrustion detection and prevention systems focus on safeguarding the entire network. They monitor network taffic and analyze packets to detect and prevent malicious activities or intrusions that could harm the network as a whole.

A

Network-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

{Blank} serve as the security guards of a network, analyzing all attempts to connect to systems on a network and determining whether the request should be allowed or denied according to the organization’s security policy.

A

Network firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tara recently analyzed the results of a vulnerability scan report and found that a vulnerability reported by the scanner did not exist because the system was actually patched as specified. Which type of error occur?

A. False positive
B. False negative
C. True positive
D. True negative

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Valerie recently installed a new device on her network that monitors traffic that passes through the organization’s firewall and blocks any traffic that appears to contain malicious attacks. Which type of system has she installed?

A. HIPS
B. HIDS
C. NIPS
D. NIDS

A

NIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly