L12 - Intrusion Detection Flashcards
A system that tries to stop intrusion from happening
a) Firewalls
b) Intrusion Detection System (IDS)
a) Firewalls
A system that tries to evaluate an intrusion after it has happened
a) Firewalls
b) Intrusion Detection System (IDS)
b) Intrusion Detection System (IDS)
A system that watches for intrusions that start within the system
a) Firewalls
b) Intrusion Detection System (IDS)
b) Intrusion Detection System (IDS)
A system that limits access between networks to prevent intrusion
a) Firewalls
b) Intrusion Detection System (IDS)
a) Firewalls
An intruder can also be referred to as a hacker or cracker
a) True
b) False
a) True
Activists are either individuals or members of an organized crime group with a goal of financial reward
a) True
b) False
b) False
Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion
a) True
b) False
a) True
Those who hack into computers do so for the thrill of it or for status
a) True
b) False
b) False
Intruders typically use steps from a common attack methodology
a) True
b) False
a) True
Which describes the following backdoor: Compiler backdoors
a) This backdoor is hard to detect because it modifies machine code
b) This backdoor can only be used by the person who created it, even if it is discovered by others
c) This backdoor inserts backdoors into other programs during compilation
c) This backdoor inserts backdoors into other programs during compilation
Which describes the following backdoor: Object Code backdoors
a) This backdoor is hard to detect because it modifies machine code
b) This backdoor can only be used by the person who created it, even if it is discovered by others
c) This backdoor inserts backdoors into other programs during compilation
a) This backdoor is hard to detect because it modifies machine code
Which describes the following backdoor: Asymmetric backdoors
a) This backdoor is hard to detect because it modifies machine code
b) This backdoor can only be used by the person who created it, even if it is discovered by others
c) This backdoor inserts backdoors into other programs during compilation
b) This backdoor can only be used by the person who created it, even if it is discovered by others
For Anomaly detection systems, the longer the system is in use, the more it learns about network activity
a) True
b) False
a) True
For Anomaly detection systems, if malicious activity looks like normal traffic to the system, it will not detect an attack
a) True
b) False
a) True
For Anomaly detection systems, false positives can become a problem, normal usage can be mistaken for an attack
a) True
b) False
a) True
For Signature Based detection systems, new threats can be detected immediately
a) True
b) False
b) False
For Signature Based detection systems, when a new virus is identified, it must be added to the signature databases
a) True
b) False
a) True
For Signature Based detection systems, it can only detect an intrusion attempt if it matches a pattern that is in the database
a) True
b) False
a) True
Could the following be considered an anomaly to typical network traffic: IP address
a) True
b) False
a) True
If an IP address is not normally accessed by users (or is unknown) then it can be considered an anomaly
Could the following be considered an anomaly to typical network traffic: Port Address
a) True
b) False
a) True
If a port address is not normally accessed by users (or is unknown) then it can be considered an anomaly