Practice Test 6 Flashcards
Which of the answers listed below illustrates the difference between passive and active security breach response?
HIPS vs. NIPS
UTM vs. Firewall
CSMA/CD vs. CSMA/CA
IDS vs. IPS
IDS vs. IPS
Intrusion Detection System
vs
Intrusion Prevention Systems
Which of the following network security solutions inspects network traffic in real-time and has the capability to stop the ongoing attack?
NIPS
HIDS
NIDS
NIST
NIPS
Network-based Intrusion Prevention System
Which of the actions listed below can be taken by an IDS? (Select 2 answers)
Firewall reconfiguration Closing down connection Logging Terminating process Sending an alert
Logging
Sending an alert
A type of IDS that relies on predetermined attack patterns to detect intrusions is referred to as a signature-based IDS.
True
False
True
An IDS that detects intrusions by comparing network traffic against the previously established baseline can be classified as: (Select all that apply)
Heuristic
Anomaly-based
Behavioral
Signature-based
Heuristic
Anomaly-based
Behavioral
A security administrator configured an IDS to receive traffic from a network switch via port mirroring. Which of the following terms can be used to describe the operation mode of the IDS? (Select 2 answers)
In-band
Passive
Inline
Out-of-band
Passive
Out-of-band
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:
Fault tolerance
False positive error
Quarantine function
False negative error
False positive error
Which of the following terms refers to a situation where no alarm is raised when an attack has taken place?
False negative
True positive
False positive
True negative
False negative
A device designed to filter and transfer IP packets between dissimilar types of computer networks is called:
Hub
Switch
Load balancer
Router
Router
Routers operate at: (Select 2 answers)
Physical layer of the OSI model Application layer of the OSI model Layer 3 of the OSI model Network layer of the OSI model Layer 5 of the OSI model
Layer 3 of the OSI model
Network layer of the OSI model
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
CRL
NAT
BCP
ACL
ACL
Which of the following answers applies to a Rule-Based Access Control (RBAC) mechanism implemented on routers, switches, and firewalls?
ACL
CSR
DLP
AUP
ACL
What type of network traffic filtering criteria can be set on a router?
Filtering by IP address Filtering by network protocol Filtering by subnet Filtering by logical port number All of the above
All of the above
A properly configured antispoofing mechanism on a router should block Internet traffic from IP addresses in the range of:
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
All of the above
All of the above
Which of the answers listed below refers to a data link layer (layer 2) device designed to forward data packets between Local Area Network (LAN) segments?
Router
Hub
Switch
Repeater
Switch