Intrusion Detection Flashcards

1
Q

_______ tries to stop intrusion from happening(Firewall or IDS)

A

firewallP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ tries to evaluate an intrusion after it has happened(Firewall or IDS)

A

IDSP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ watches for intrusions that start within the system(Firewall or IDS)

A

IDSP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______ limits access between networks to prevent intrusion

A

FirewallP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An intruder can also be referred to as a hacker or cracker

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activists are either individuals or members of an organized crime group with a goal of financial reward

A

falseP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Those who hack into computer do so for the thrill of it or for status

A

falseP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intruders typically use steps from a common attack methodology

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This backdoor is hard to detect because it modifies machine code

A

Object code backdoorsP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This backdoor can only be used by the person who created it, even if it is discovered by others

A

Asymmetric backdoorsP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This backdoor inserts backdoors into other programs during compilation

A

Compiler backdoorsP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The longer an anomaly detection system is in use, the more it learns about network activity

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If malicious activity looks like normal traffic to the anomaly detection system, it will not detect an attack

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

False positives from an anomaly detection system can become a problem, normal usage can be mistaken for an attack

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

With signature based detection, new threats can be detected immediately

A

falseP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

With signature based detection, when a new virus is identified, it must be added to the signature databases

A

trueP2 L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Signature-based detection systems can only detect an intrusion attempt if it matches a pattern that is in the database

A

trueP2 L4

19
Q

Which of the following could be considered an anomaly to a typical networkA) An IP addressB) A port addressC) Packet lengthD) Flag setting

A

All of themP2 L4

20
Q

with _________, any action that does not fit the normal behavior profile is considered an attack

A

statistical intrusion detectionP2 L4

21
Q

with _________, any action that is not classified as normal is considered to be an attack

A

knowledge based intrusion detectionP2 L4

22
Q

_______ anomaly detection detects attacks similar to past attacks

A

machine learning intrusion detectionP2 L4

23
Q

One of the weaknesses of anomalous intruder detection is that a system must learn what is normal behavior. WHile it is learning this, the network is vulnerable to attack. What can be done to mitigate this weakness?

A

use a firewall.P2 L4

24
Q

In the thriving 0-day attack marketplace hackers sell information on software vulnerabilities. Can you guess some of the buyers?A) AppleB) Google C) Microsoft,D) U.S. Government

A

allP2 L4

25
Q

with a(n) _______ attack, an attacker sends various kinds of packets to probe a system or network for vulnerability that can be exploited

A

scanning attackP2 L4

26
Q

with a(n) _______ attack, the attack attempts to slow down or completely shut down a target so as to disrupt the service for legitimate users

A

DOSP2 L4

27
Q

with a(n) _______ attack, an attacker gains unauthorized control of a system

A

penetrationP2 L4

28
Q

Can you think of a way to reduce the impact of excessive reporting on a system’s administrator?

A

Prioritize the alertsP2 L4

29
Q

Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified

A

trueP2 L4

30
Q

The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts.

A

trueP2 L4

31
Q

Signature-based approaches attempt to define normal, or expected, behavior, whereas anomaly approaches attempt to define proper behavior

A

falseP2 L4

32
Q

A network IDS sensor monitors a copy of network traffic, the actual traffic does not pass through the devices

A

trueP2 L4

33
Q

Network-based intrusion detection can make use of signature detection and anomaly detection

A

trueP2 L4

34
Q

When using sensors, which of the following is considered good practice?A) Set the IDS level to the highest sensitivity to detect every attackB) Monitor both outbound and inbound trafficC) Use a shared network resource to gather NIDS dataD) NIDS sensors are not turnkey solutions, system administrators must interpret alerts

A

B) monitor both outbound and inbound trafficD) NIDS sensors are not turnkey solutions, system administrators must interpret alertsP2 L4

35
Q

A common location for a NIDS sensor is just inside the external firewall

A

trueP2 L4

36
Q

A honeypot can be a workstation that a user uses for work

A

falseP2 L4

37
Q

There is no benefit of deploying a NIDS or honeypot outside of the firewall

A

falseP2 L4

38
Q

To improve detection performance, an IDS should reduce false alarm rate while detecting as many intrusions as possible

A

trueP2 L4

39
Q

to improve detection performance, an IDS should apply detection models at all unfiltered packet data directly.

A

falseP2 L4

40
Q

to improve detection performance, an IDS should apply detection models at processed event data that has higher base rate

A

trueP2 L4

41
Q

To defeat an IDS, attackers can send a huge amount of traffic

A

trueP2 L4

42
Q

To defeat an IDS, attackers can embed attack in packets which cause non-uniform processing by different operating systems, e.g. bad checksum, overlapping fragments

A

trueP2 L4

43
Q

To defeat an IDS, attackers can send traffic that purposely matches detection rules

A

trueP2 L4

44
Q

To defeat an IDS, attackers can send a packet that would trigger a buffer-overload in the IDS code

A

true P2 L4