IS4560 CH 15 Defensive Technologies Flashcards
1
Q
- HIDS can monitor network activity.
A. True
B. False
A
False
2
Q
2. A(n) \_\_\_\_\_\_\_\_ monitors activity on one host, but cannot monitor an entire network. A. NIDS B. Firewall C. HIDS D. DMZ
A
HIDS
3
Q
3. A(n) \_\_\_\_\_\_\_\_ has the ability to monitor network activity. A. NIDS B. HIDS C. Firewall D. Router
A
NIDS
4
Q
4. \_\_\_\_\_\_\_\_ can monitor changes to system files. A. Hashes B. HIDS C. NIDS D. Router
A
HIDS
5
Q
- Signature-based IDSs look for known attack patterns and types.
A. True B. False
A
True
6
Q
- Anomaly-based IDSs look for deviations from normal network activity.
A. True B. False
A
True
7
Q
- An IPS is designed to look for and stop attacks.
A. True
B. False
A
True
8
Q
8. What is used to monitor an NIDS? A. Console B. Sensor C. Network D. Router
A
Console
9
Q
9. What are deployed to detect activity on the network? A. Console B. Sensors C. Network D. Router
A
Sensors
10
Q
10. \_\_\_\_\_\_\_\_ can only monitor an individual network segment. A. HIDS B. NIDS C. NAT D. Sensors
A
Sensors