Chapter 7 Flashcards

1
Q

What is IDPS?

A

Intrusion Detection Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of IDPS?

A

NIDPS
WIDPS
HIDPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is NIDPS

A

Network based IDPS
In organizations network, looks for signs of attacks using special implementation of NIDPS for invalid data packets, checks for packets with improper use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some pros of NIDPS?

A

When implemented enables organization to use a few devices to monitor large network
Not susceptible to direct attack and may not be detectable by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cons of NIDPS?

A

Cannot scan encrypted packets

Requires access to all traffic to be monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is WNIDPS?

A

Wireless NIDPS

Monitors wireless network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is HIDPS?

A

Host based IDPS

Resides on a particular server and monitors only on that system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantage HIDPS over NIDPS?

A

Can be installed so that it can access data encrypted when traveling over network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cons of HIDPS?

A

Management issues

Does not detect multihost scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDPS Detection Methods?

A

Signature Based IDPS
Statistical anomaly based
Stateful protocol
Log file monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is signature based IDPS?

A

Checks data traffic with the patterns that match known signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Statistical Anomaly IDPS?

A

Samples network activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 IDPS control strategies?

A

Centralized
Fully distributed
Partially distributed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a centralized control strategy?

A

All IDPS control functions are implemented and managed in a central location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Fully Distributed?

A

All control functions are applied at the physical location of each IDPS component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is partially distributed?

A

Combines centralized and fully distributed. Analyze local threats report at the hierarchical central facility to enable threat attacks

17
Q

What is a honeypot?

A

A server decoy for the attackers. Designed to lure attackers from critical systems

18
Q

What is a honeynet?

A

Collection of honeypots connecting several honey pot system on a subnet

19
Q

What is a padded cell?

A

A more protected honeypot.

20
Q

Advantages of padded cell?

A

Attackers get diverted to targets they cannot damage

Admins get more time to decide how to respond

21
Q

What is a footprinting?

A

An action that researches of internet addresses owned by an organization

22
Q

What is a fingerprinting?

A

A systematic survey of all target internet addresses collected in footprinting

23
Q

Why is fingerprinting useful?

A

Fingerprinting reveals useful information about internal structure of an attack.

24
Q

What is a port scanner?

A

A port scanner can be used by both of the attackers and defenders to identify computers active on a network and other useful information.

25
What is a vulnerability scanner?
Its a scanner that scans for holes in networks.
26
What is a packet sniffer?
It captures copies of packets from the network and analyzes them.