IS4560 CH 15 Defensive Technologies Flashcards

1
Q
  1. HIDS can monitor network activity.
    A. True
    B. False
A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
2. A(n) \_\_\_\_\_\_\_\_ monitors activity on one host, but cannot monitor an entire network.
A. NIDS 
B. Firewall 
C. HIDS 
D. DMZ
A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
3. A(n) \_\_\_\_\_\_\_\_ has the ability to monitor network activity.
A. NIDS 
B. HIDS 
C. Firewall 
D. Router
A

NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
4. \_\_\_\_\_\_\_\_ can monitor changes to system files.
A. Hashes 
B. HIDS 
C. NIDS 
D. Router
A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Signature-based IDSs look for known attack patterns and types.
    A. True B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Anomaly-based IDSs look for deviations from normal network activity.
    A. True B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. An IPS is designed to look for and stop attacks.
    A. True
    B. False
A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
8. What is used to monitor an NIDS?
A. Console 
B. Sensor 
C. Network 
D. Router
A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
9. What are deployed to detect activity on the network?
A. Console 
B. Sensors 
C. Network 
D. Router
A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
10. \_\_\_\_\_\_\_\_ can only monitor an individual network segment.
A. HIDS 
B. NIDS 
C. NAT 
D. Sensors
A

Sensors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly