Exploring Advanced Security Devices Flashcards

1
Q

HIDS only monitor network activity on a single host, true or false?

A

False. Some Host-based Intrusion Detection Systems monitor application activity on a host too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What software can detect malware that traditional antivirus software can’t?

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

On what might you install HIDS and why?

A

You might install it on a server with sensitive data that is of increased likelihood of attack to provide an extra layer of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On what are Network-based Intrusion Detection systems usually installed?

A

On routers or firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How would you get around a NIDS detecting potentially malicious traffic?

A

By encrypting the traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

firewall logs
system logs
applications logs
are some of the logs used by what to collect information on activity?

A

An IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How should an administrator set the upper and lower threshold to control false positives / false negatives on an IDS/IPS

A

based on the network’s activity level and their personal preferences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s the difference between in-line/in-band and out of band?

A

in-line means all traffic passed through the device, like in an IPS. out of band means the device passively monitors the traffic but the traffic doesn’t pass through it, like in an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What device is often used to solve the problem of malicious attacks hidden in encrypted traffic? Where is it typically installed?

A

An SSL encryptor. It’s installed in-line with traffic and the NIDS so it decrypts traffic first before sending it to the NIDS for inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between the data-plane and the control-plane in an SDN?

A

data-plane is concerned with what traffic to forward or block
the control-plane is concerned with identifying the path the traffic should take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two primary goals of a honeypot?

A

1) divert attackers from the live network

2) allow observation of an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly