Lecture 10 Pt. 1 Flashcards

1
Q

What does IPS stand for?

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main function of an IDS is to _________ and _______ anomalous or malicious activity

A

To monitor and detect anomalous or malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main function of an Intrusion Prevention System (IPS)?

A

To detect and prevent malicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: An IDS is primarily a d______ solution.

A

diagnostic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of detection used by IDS and IPS?

A
  • Signature-based detection
  • Anomaly-based detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: An IDS can block malicious traffic.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between a Network Intrusion Detection System (NIDS) and a Host Intrusion Detection System (HIDS)?

A
  • NIDS monitors traffic across multiple sensor points
  • HIDS is placed directly on devices to monitor traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What action does an IPS take when it detects malicious traffic?

A

It can block and log the malicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does ‘Defense-in-Depth’ refer to in network security?

A

A strategy that uses multiple layers of security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the actions that can be taken in Snort IDS mode?

A
  • Alert
  • Log
  • Pass
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What additional action does an IPS take compared to IDS?

A

Block malicious traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: Anomaly-based IDS solutions detect threats based on _______ patterns.

A

suspicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of Application Protocol-based Intrusion Detection Systems (APIDS)?

A

To monitor traffic across specific application layer protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a Wireless Intrusion Prevention System (WIPS) monitor?

A

Wireless networks owned by an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does an IPS differ from an IDS in terms of response to threats?

A

IPS can autonomously stop threats before they cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: IDS can operate without human intervention.

17
Q

What is the role of a Network Behavioral Analysis (NBA) system?

A

To detect anomalous behavior within network patterns

18
Q

‘signature-based detection’ uses ___-_______ signatures to identify known threats

A

It uses pre-existing signatures to identify known threats

19
Q

An ‘alert’ is triggered in IDS when potentially _ _ _ _ _ _ _ _ _ or _ _ _ _ _ _ _ _ _ _ _ activty is detected on the network or host

A

An alert is a message or notification triggered by the IDS when it detects potentially malicious or unauthorized activity on the network or host.

20
Q

Fill in the blank: An IPS typically operates in the same network location as a _______.

21
Q

What are some examples of IDS technologies mentioned?

A
  • SNORT
  • Cisco NGIDS/IPS
  • Security Onion
22
Q

What does the term ‘malicious traffic’ refer to?

A

Traffic that is harmful or intended to compromise network security

23
Q

What is the purpose of a Web Application Firewall (WAF)?

A

To address specific web application attacks

24
Q

What kind of detection does a Protocol-based Intrusion Detection System (PIDS) perform?

A

A analyzes protocol-specific traffic for signs of misuse or anomaly.