Quiz: Module 07 Flashcards

1
Q

An intrusion detection and prevention system is one that determines whether activity is present that is contrary to organization policy and represents a(n) _____.
a. intrusion
b. policy violation
c. vulnerability
d. threat

A

a. intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing both false positives and false negatives is known as _____.
a. clustering
b. compaction
c. filtering
d. turning

A

d. turning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether an attack has occurred or may be under way.
a. packet sniffing
b. port monitoring
c. anomaly detection
d. signature matching

A

d. signature matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When the measured activity is outside the baseline parameters, it is said to exceed the ____ (the level at which the IDPS triggers an alert to notify the administrator).
a. baseline level
b. footprint level
c. clipping level
d. root level

A

c. clipping level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A process used to develop knowledge that allows an organization to understand the actions and intentions of threat actors and develop methods to prevent or mitigate cyberattacks is known as _____.
a. threat intelligence
b. penetration testing
c. risk management
d. the kill chain

A

a. threat intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The intrusion detection and prevention system (IDPS) is like a computer data burglar alarm.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Site policies are the rules and configuration guidelines governing the implementation and operation of IDPSs within the organization.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Because IDPS technologies are well established and inexpensive, few organizations require documentation of the threat from which the organization must be protected.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An application-based IDPS monitors a single application for abnormal events.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An anomaly-based IDPS collects statistical summaries by observing traffic that is known to be abnormal.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly