Objective 6a Flashcards

1
Q

Monitors network traffic and changes to computer settings to detect patterns indicating known intrusion attempts

A

Intrusion Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

System scanning, auditing, and monitoring security infrastructure for signs of attacks in progress

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blocks network traffic when it detects intrusion

A

Active IDS (Also known as Intrusion Prevention System, IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Monitors network traffic and only alerts administrator about suspicious traffic

A

Passive IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examines network traffic for suspicious patterns

A

Network-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examines servers or client computers for patterns of an intrusion

A

Host-Based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When shows of an attack has happened but triggered by normal traffic or results from misconfigured equipment

A

False Positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provides insight to what may be happening on network and systems

A

Passive IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Allows administrators to see misuse occurring within system itself

A

Host Based Intrusion Detection System (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Primarily uses passive hardware sensors to monitor traffic on specific segment of network

A

Network Based Intrusion Detection System (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Look for specific groupings of characters common in known attacks

A

String Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watch for connection attempts to well-known, frequently attacked ports

A

Port Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Watch for dangerous or illogical combinations in packet headers

A

Header Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly