CYB236 Chapter 7: Intrusion Detection Systems
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a consequence of an unattended workstation being used by an intruder?

  • Consumption of resources and slowed performance (correct)
  • Patch installation for known vulnerabilities
  • Enhanced security measures
  • Legitimate users being prevented from using a service

What is the primary motivation of hackers?

  • Political activism
  • Thrisk of access and/or status (correct)
  • Financial gain
  • Revenge against a company

What is the goal of a Denial of Service (DOS) attack?

  • To spread malware
  • To steal sensitive data
  • To prevent legitimate users of a service from using that service (correct)
  • To install backdoors

What is an intrusion defined as?

<p>Any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource (B)</p> Signup and view all the answers

What is a Masquerader?

<p>An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account (D)</p> Signup and view all the answers

What is an example of a malicious user using a fake IP address?

<p>Address spoofing (D)</p> Signup and view all the answers

What is a Clandestine user?

<p>An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection (C)</p> Signup and view all the answers

What is the purpose of an Intrusion Prevention System (IPS)?

<p>To detect intrusions (C)</p> Signup and view all the answers

What is a Misfeasor?

<p>A legitimate user who accesses data, programs, or resources for which such access is not authorized (B)</p> Signup and view all the answers

What is an example of a type of malicious software?

<p>Virus (A)</p> Signup and view all the answers

What is a reason why an unsecured modem can be a security risk?

<p>It can be used to access internal networks (D)</p> Signup and view all the answers

What is an Insider attack?

<p>An attack by a person with authorized access to the system (B)</p> Signup and view all the answers

What is a Cracker?

<p>Malicious software that attacks a system (A)</p> Signup and view all the answers

What is the term for organized groups of hackers?

<p>Criminal hackers (D)</p> Signup and view all the answers

What is a type of Insider attack?

<p>All of the above (D)</p> Signup and view all the answers

What is a common target of criminal hackers on e-commerce servers?

<p>Credit card files (D)</p> Signup and view all the answers

What is a Hacker?

<p>A person who attacks a system via communication links (B)</p> Signup and view all the answers

Why are insider attacks particularly challenging to detect and prevent?

<p>Because employees have access and knowledge of systems (C)</p> Signup and view all the answers

What can be used to detect and prevent insider attacks?

<p>IDS / IPS systems, enforcement of least privilege, monitoring of logs, and strong authentication (B)</p> Signup and view all the answers

What motivates insiders to carry out attacks?

<p>Revenge or entitlement (B)</p> Signup and view all the answers

What should sensitive data be protected with?

<p>Encryption (B)</p> Signup and view all the answers

What is a security incident where an intruder gains unauthorized access to a system?

<p>Security intrusion (A)</p> Signup and view all the answers

What is a common characteristic of criminal hackers?

<p>They act quickly once they penetrate a system (B)</p> Signup and view all the answers

Why are IDS / IPS systems less effective against criminal hackers?

<p>They are less effective against targeted attacks (B)</p> Signup and view all the answers

What is the primary purpose of an Intrusion Detection System?

<p>To detect and provide warnings of unauthorized access attempts (A)</p> Signup and view all the answers

What is the primary function of a Sensor in an IDS?

<p>To collect data from the network and forward it to the analyzer (B)</p> Signup and view all the answers

What is the role of an Analyzer in an IDS?

<p>To determine if an intrusion has occurred (B)</p> Signup and view all the answers

What type of input can a Sensor receive in an IDS?

<p>Any part of a system that could contain evidence of an intrusion (D)</p> Signup and view all the answers

What is the purpose of the Reporting function in an IDS?

<p>To generate conclusions and act on analysis results (B)</p> Signup and view all the answers

What is the primary difference between an IDS and a Firewall?

<p>IDS detects attacks, while Firewalls prevent them (C)</p> Signup and view all the answers

What is the primary benefit of using an IDS in addition to a Firewall?

<p>To add an additional layer of security (D)</p> Signup and view all the answers

What are the three logical components of an IDS?

<p>Sensors, Analyzers, and Reporters (D)</p> Signup and view all the answers

What is the primary purpose of the output of an IDS component?

<p>To indicate that an intrusion has occurred (D)</p> Signup and view all the answers

What is a key characteristic of an IDS's user interface?

<p>It may be equivalent to a manager, director, or console component (B)</p> Signup and view all the answers

Which of the following is NOT a requirement for an IDS?

<p>It must be able to predict future intrusions (D)</p> Signup and view all the answers

What is the primary purpose of an IDS's ability to resist subversion?

<p>To ensure the IDS can monitor itself and detect modifications (B)</p> Signup and view all the answers

What is the consequence of an IDS's ability to provide graceful degradation of service?

<p>If some components of the IDS stop working, the rest will be affected as little as possible (A)</p> Signup and view all the answers

What is a key benefit of an IDS's ability to adapt to changes in system and user behavior over time?

<p>It can better respond to changing security threats (A)</p> Signup and view all the answers

What is a key requirement for an IDS in terms of its operation?

<p>It must be able to run continually with minimal human supervision (A)</p> Signup and view all the answers

What is the primary purpose of an IDS's ability to be configured according to the security policies of the system being monitored?

<p>To ensure the IDS is aligned with the system's security policies (B)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser