Network Based Security Flashcards
The IPS typically sits __________ and provides a layer of analysis that negatively selects for dangerous content.
directly behind firewall
Network
Host-based
VM-based
Perimeter-based
These are all categories of what?
Intrusion Protection System
Snort
Intrusion Detection System
Social Engineering
Intrusion Detection System
True or False: Positioning an IDS inside the firewall will typically cover exploits that originate from inside your network targeting your hosts.
True
False
False
Jim is a senior network administrator at a large company. Recently the company had suffered a breach costing nearly half a million dollars. Following the attack Jim’s company hired a cybersecurity firm to perform penetration tests on their network and the pentesters from the cybersecurity firm found several vulnerabilities to their network, and also noted the need for an IDS. After receiving the report from the cybersecurity firm, Jim implemented an independent IDS that identifies intrusions by examining network traffic and monitors multiple hosts. Which IDS category has Jim implemented in his network?
Network Intrusion Detection System
True or False: Because traffic flows through an Intrusion Prevention System, very rarely does an IPS cause degradation in network performance.
True
False
False
Jim is a senior network administrator at a large company. Recently the company had suffered a breach costing nearly half a million dollars. Following the attack Jim’s company hired a cybersecurity firm to perform penetration tests on their network and the pentesters from the cybersecurity firm found several vulnerabilities to their network and provided a report detailing ways to help fix these issues. One of the pentesters was able to modify several access control lists, and obtain password files without setting off any alarms. To make sure that this does not happen again, what category of IDS would help detect these actions in the future?
Host-Based Intrusion Detection System
Which type of Intrusion Detection System builds a model of acceptable behavior and flag exceptions to the model?
Hueristic
Match the IPS functions with the appropriate definition: This approach requires administrators to configure security policies according to organizational security policies and the network infrastructure.
Anomaly Detection
Signature-Based Detection
Perimeter-Based Detection
Policy-Based
Policy-Based
Match the category of intrusion detection system with its definition: An agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability databases, access control lists and so on) and other host activities and state.
Perimeter-based Intrusion Detection System
Network Intrusion Detection System
Host-based Intrusion Detection System
VM based Intrusion Detection System
Host-based Intrusion Detection System
Match the IPS functions with the appropriate definition: Based on patterns that are known to be malicious. It also adds to the record every time something new that is a threat comes across.
Perimeter-Based Detection
Signature-Based Detection
Policy-Based
Anomaly Detection
Signature-Based Detection
Match the category of intrusion detection system with its definition: VMIDS detects intrusions using virtual machine monitoring. By using this, we can deploy the intrusion detection system with virtual machine monitoring.
Host-based Intrusion Detection System
VM based Intrusion Detection System
Perimeter-based Intrusion Detection System
Network Intrusion Detection System
VM based Intrusion Detection System
True or False: Much like an IDS, firewalls can also detect and alert when an attack takes place.
True
False
False
True or False: When first implementing a IPS on a network it is best to have it set up on the strictest settings allowed until healthy behavior is identified.
True
False
True
Match the category of intrusion detection system with its definition: Detects and pinpoints the location of intrusion attempts on perimeter fences of critical infrastructures.
Perimeter-based Intrusion Detection System
Host-based Intrusion Detection System
Network Intrusion Detection System
VM based Intrusion Detection System
Perimeter-based Intrusion Detection System
Fill in the blank: ________ is a device, typically another separate computer, that monitors activity to identify malicious or suspicious events.
Intrusion Detection System