Detection and Prevention Flashcards

1
Q

You are concerned about attacks directed at your network firewall. You want to be able to identify and be
notified of any attacks. In addition, you want the system to take immediate action when possible to stop or
prevent the attack.
Which tool should you use?

IDS
Packet sniffer
IPS
Port scanner

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most common form of host based IDS that employs signature or pattern matching detection
methods?

Motion detectors
Anti-virus software
Firewalls
Honey pots

A

Anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack? (Select
two.)

The IDS configuration is changed dynamically and the source IP address is banned.
The IDS logs all pertinent data about the intrusion.
An alert is generated and delivered via Email, the console, or an SNMP trap.
LAN side clients are halted and removed from the domain.

A

The IDS logs all pertinent data about the intrusion.

An alert is generated and delivered via Email, the console, or an SNMP trap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a
database?

Signature based
Stateful inspection based
Heuristics based
Anomaly analysis based

A

Signature based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

As a security precaution, you have implemented IPsec that is used between any two devices on your network.
IPsec provides encryption for traffic between devices.
You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any
malicious attacks.
Which solution should you implement?

Port scanner
Network based IDS
Host based IDS
VPN concentrator
Protocol analyzer
A

Host based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security mechanism can be used to detect attacks originating on the Internet or from within an internal
trusted subnet?

Security alarm
Firewall
Biometric system
IDS

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following devices can monitor a network and detect potential security attacks?

CSU/DSU
DNS server
IDS
Proxy
Load balancer
A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are concerned about protecting your network from network-based attacks from the Internet. Specifically,
you are concerned about “zero day” attacks (attacks that have not yet been identified or that do not have
prescribed protections).
Which type of device should you use?

Anti-virus scanner
Signature based IDS
Network based firewall
Anomaly based IDS
Host based firewall
A

Anomaly based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following functions can a port scanner provide? (Select two.)

Discovering unadvertised servers.
Testing virus definition design for false positives.
Auditing IPsec encryption algorithm configuration.
Determining which ports are open on a firewall.

A

Discovering unadvertised servers.

Determining which ports are open on a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is a security service that monitors network traffic in real time or reviews the audit logs
on servers looking for security violations?

Switch
Firewall
Padded cell
IDS

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You want to make sure that a set of servers will only accept traffic for specific network services. You have
verified that the servers are only running the necessary services, but you also want to make sure that the
servers will not accept packets sent to those services.
Which tool should you use?

System logs
Packet sniffer
IDS
Port scanner
IPS
A

Port scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following devices is capable of detecting and responding to security threats?

IPS
IDS
Multilayer switch
DNS server

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly