CHAPTER 8 Flashcards

1
Q

An intruder can also be referred to as a hacker or cracker.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Activists are either individuals or members of an organized crime
group with a goal of financial reward

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Those who hack into computers do so for the thrill of it or for status

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intruders typically use steps from a common attack methodology

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The IDS component responsible for collecting data is the user interface.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The primary purpose of an IDS is to detect intrusions, log suspicious
events, and send alerts.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Signature-based approaches attempt to define normal, or expected,
behavior, whereas anomaly approaches attempt to define proper behavior

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Anomaly detection is effective against misfeasors

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To be of practical use an IDS should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An inline sensor monitors a copy of network traffic; the actual traffic
does not pass through the device

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A common location for a NIDS sensor is just inside the external
firewall.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network-based intrusion detection makes use of signature detection
and anomaly detection

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Snort can perform intrusion prevention but not intrusion detection.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. _________ are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes.
    A. State-sponsored organizations B. Activists
    C. Cyber criminals D. Others
A

Activists

17
Q

A _________ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.
A. intrusion detection B. IDS
C. criminal enterprise D. security intrusion

A

security intrusion

18
Q

A _________ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
A. host-based IDS B. security intrusion
C. network-based IDS D. intrusion detection

A

host-based IDS

19
Q

A ________ monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.
A. host-based IDS B. security intrusion
C. network-based IDS D. intrusion detection

A

network-based IDS

20
Q

The ________ is responsible for determining if an intrusion has occurred.
A. analyzer B. host
C. user interface D. sensor

A

analyzer

21
Q

__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
A. Profile based detection B. Signature detection
C. Threshold detection D. Anomaly detection

A

Signature detection

22
Q

_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
A. Profile based detection B. Signature detection
C. Threshold detection D. Anomaly detection

A

Anomaly detection

23
Q

A (n) __________ is a hacker with minimal technical skill who primarily uses existing attack toolkits.
A. Master B. Apprentice
C. Journeyman D. Activist

A

Apprentice

24
Q

The _________ module analyzes LAN traffic and reports the results to the central manager.
A. LAN monitor agent B. host agent
C. central manager agent D. architecture agent

A

LAN monitor agent

25
Q

The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
A. central manager agent B. LAN monitor agent
C. host agent D. architecture agent

A

host agent

26
Q

A(n) ________ is inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.
A. passive sensor B. analysis sensor
C. LAN sensor D. inline sensor

A

inline sensor

27
Q

A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way.
A. PEP B. DDI
C. IDEP D. IDME

A

DDI

28
Q

_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.
A. RFC 4767 B. RFC 4766
C. RFC 4765 D. RFC 4764

A

RFC 4767

29
Q

The rule _______ tells Snort what to do when it finds a packet that matches the rule criteria.
A. protocol B. direction
C. action D. destination port

A

action

30
Q

The _______ is the ID component that analyzes the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
A. data source B. sensor
C. operator D. analyzer

A

analyzer