midterm-CIS359 - Question 1 1 out of 1 points The use of IDPS sensors and analysis systems can be quite complex One very common approach is to use an

midterm-CIS359 - Question 1 1 out of 1 points The use of...

This preview shows page 1 - 4 out of 14 pages.

Question 11 out of 1 pointsThe use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software program called ____ running on an open source UNIX or Linux system that can be managed and queried from a desktop computer using a client interface. Question 21 out of 1 pointsUsing a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be under way. Question 31 out of 1 pointsThe ____ of a hub, switch or other networking device is a specially configured connection that is capable of viewing all the traffic that moves through the entire device. Question 40 out of 1 pointsThe ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications.
Image of page 1
Question 51 out of 1 points____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation. Question 61 out of 1 pointsNew systems can respond to an incident threat autonomously, based on preconfigured options that go beyond simple defensive actions usually associated with IDPS and IPS systems. These systems, referred to as ____, use a combination of resources to detect an intrusion and then to trace the intrusion back to its source. Question 71 out of 1 pointsA(n) ____ is the set of rules and configuration guidelines governing the implementation and operation of IDPSs within the organization. Question 8 1 out of 1 points A ____ is a synonym for a virtualization application.
Image of page 2
Question 91 out of 1 pointsA backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization.
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 14 pages?

  • Spring '14
  • CSIRT

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture