Intrusion Detection Flashcards
_______ tries to stop intrusion from happening(Firewall or IDS)
firewallP2 L4
_______ tries to evaluate an intrusion after it has happened(Firewall or IDS)
IDSP2 L4
_______ watches for intrusions that start within the system(Firewall or IDS)
IDSP2 L4
_______ limits access between networks to prevent intrusion
FirewallP2 L4
An intruder can also be referred to as a hacker or cracker
trueP2 L4
Activists are either individuals or members of an organized crime group with a goal of financial reward
falseP2 L4
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion
trueP2 L4
Those who hack into computer do so for the thrill of it or for status
falseP2 L4
Intruders typically use steps from a common attack methodology
trueP2 L4
This backdoor is hard to detect because it modifies machine code
Object code backdoorsP2 L4
This backdoor can only be used by the person who created it, even if it is discovered by others
Asymmetric backdoorsP2 L4
This backdoor inserts backdoors into other programs during compilation
Compiler backdoorsP2 L4
The longer an anomaly detection system is in use, the more it learns about network activity
trueP2 L4
If malicious activity looks like normal traffic to the anomaly detection system, it will not detect an attack
trueP2 L4
False positives from an anomaly detection system can become a problem, normal usage can be mistaken for an attack
trueP2 L4
With signature based detection, new threats can be detected immediately
falseP2 L4
With signature based detection, when a new virus is identified, it must be added to the signature databases
trueP2 L4