CTC 452 Quiz 6

25 July 2022
4.7 (114 reviews)
19 test answers

Unlock all answers in this set

Unlock answers (15)
question
On a workstation or server
answer
Where is a host-based IDPS agent typically placed?
question
An HIDPS can detect attacks not caught by an NIDPS
answer
Which of the following is true about an NIDPS versus an HIDPS?
question
True
answer
A weakness of a signature-based system is that it must keep state information on a possible attack.
question
Internet Gateway
answer
Which of the following is NOT a typical IDPS component?
question
Baseline Detection
answer
Which of the following is NOT a primary detection methodology?
question
Monitors OS and application logs
answer
Which of the following is true about an HIDPS?
question
False
answer
An IDPS consists of a single device that you install between your firewall and the Internet.
question
Communication between IDPS components should be encrypted
answer
Which of the following is an IDPS security best practice?
question
System can detect attacks from inside the network by people with stolen accounts
answer
What is an advantage of the anomaly detection method?
question
Inline Only
answer
Which of the following is a sensor type that uses bandwidth throttling and alters malicious content?
question
False positives do not compromise network security
answer
Which of the following is true about the steps in setting up and using an IDPS?
question
Packet Filter
answer
Which of the following is NOT a method used by passive sensors to monitor traffic?
question
Identification
answer
Which of the following is NOT a network defense function found in intrusion detection and prevention systems?
question
Each signature is assigned a number and name
answer
Which of the following is an advantage of a signature-based detection system?
question
Hybrid
answer
Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?
question
True
answer
A hybrid IDPS combines aspects of NIDPS and HIDPS configuration
question
to allow a baseline of data to be compiled
answer
Why might you want to allow extra time for setting up the database in an anomaly-based system?
question
heuristic
answer
Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?
question
the subnet mask is 255.255.0.0
answer
If you see a /16 in the header of a snort rule, what does it mean?