Selected Answer Tru e Question 14 0 out of 0 points When using trap and trace

Selected answer tru e question 14 0 out of 0 points

This preview shows page 2 - 6 out of 8 pages.

crossed, either positively or negatively. Selected Answer: Tru e Question 14 0 out of 0 points When using trap-and-trace, the trace usually consists of a honeypot or padded cell and an alarm. _________________________ Answer s: Fals
Image of page 2
e Question 15 0 out of 0 points The activities that gather information about the organization and its network activities and assets is called fingerprinting . _________________________ Selected Answer: Fals e Question 16 0 out of 0 points A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss. _________________________ Selected Answer: Tru e Answers: Tru e Fals e Question 17 0 out of 0 points To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base. Selected Answer: b. signatures Question 18 0 out of 0 points An HIDPS can detect local events on host systems and also detect attacks that may elude a network- based IDPS. Answer s: Tru e Question 19 0 out of 0 points Enticement is the action of luring an individual into committing a crime to get a conviction. _________________________ Selected Answer: Fals e Answers: Tru e Fals e Question 20 0 out of 0 points To assist in the footprint intelligence collection process, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses. Selected Tru
Image of page 3
Answer: e Answers: Tru e Fals e Question 2 0 out of 0 points Preconfigured, predetermined attack patterns are called signatures . _________________________ Answer s: Tru e Question 3 0 out of 0 points Activities that scan network locales for active systems and then identify the network services offered by the host systems is known as __________. Selected Answer: d. fingerprinting Question 4 0 out of 0 points A broadcast vulnerability scanner is one that initiates traffic on the network in order to determine security holes. Selected Answer: Fals e Question 5 0 out of 0 points A padded cell is a hardened honeynet . _________________________ Answer s: Fals e Question 6 0 out of 0 points The primary advantages of a a centralized IDPS control strategy are cost and ease-of-use . _________________________ Selected Answer: Fals e Question 7 0 out of 0 points Alarm filtering is alarm clustering that may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other criteria that are defined by the system administrators. _________________________ Selected Answer: Fals e Answers: Tru e Fals e
Image of page 4
Question 8 0 out of 0 points __________ are decoy systems designed to lure potential attackers away from critical systems. Selected Answer: b. Honeypots Question 9 0 out of 0 points To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 8 pages?

  • Spring '15
  • TimEllis
  • Simple Network Management Protocol, IDPs

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture