CYB236 Chapter 7: Intrusion Detection Systems
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a consequence of an unattended workstation being used by an intruder?

  • Consumption of resources and slowed performance (correct)
  • Patch installation for known vulnerabilities
  • Enhanced security measures
  • Legitimate users being prevented from using a service
  • What is the primary motivation of hackers?

  • Political activism
  • Thrisk of access and/or status (correct)
  • Financial gain
  • Revenge against a company
  • What is the goal of a Denial of Service (DOS) attack?

  • To spread malware
  • To steal sensitive data
  • To prevent legitimate users of a service from using that service (correct)
  • To install backdoors
  • What is an intrusion defined as?

    <p>Any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource</p> Signup and view all the answers

    What is a Masquerader?

    <p>An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account</p> Signup and view all the answers

    What is an example of a malicious user using a fake IP address?

    <p>Address spoofing</p> Signup and view all the answers

    What is a Clandestine user?

    <p>An individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection</p> Signup and view all the answers

    What is the purpose of an Intrusion Prevention System (IPS)?

    <p>To detect intrusions</p> Signup and view all the answers

    What is a Misfeasor?

    <p>A legitimate user who accesses data, programs, or resources for which such access is not authorized</p> Signup and view all the answers

    What is an example of a type of malicious software?

    <p>Virus</p> Signup and view all the answers

    What is a reason why an unsecured modem can be a security risk?

    <p>It can be used to access internal networks</p> Signup and view all the answers

    What is an Insider attack?

    <p>An attack by a person with authorized access to the system</p> Signup and view all the answers

    What is a Cracker?

    <p>Malicious software that attacks a system</p> Signup and view all the answers

    What is the term for organized groups of hackers?

    <p>Criminal hackers</p> Signup and view all the answers

    What is a type of Insider attack?

    <p>All of the above</p> Signup and view all the answers

    What is a common target of criminal hackers on e-commerce servers?

    <p>Credit card files</p> Signup and view all the answers

    What is a Hacker?

    <p>A person who attacks a system via communication links</p> Signup and view all the answers

    Why are insider attacks particularly challenging to detect and prevent?

    <p>Because employees have access and knowledge of systems</p> Signup and view all the answers

    What can be used to detect and prevent insider attacks?

    <p>IDS / IPS systems, enforcement of least privilege, monitoring of logs, and strong authentication</p> Signup and view all the answers

    What motivates insiders to carry out attacks?

    <p>Revenge or entitlement</p> Signup and view all the answers

    What should sensitive data be protected with?

    <p>Encryption</p> Signup and view all the answers

    What is a security incident where an intruder gains unauthorized access to a system?

    <p>Security intrusion</p> Signup and view all the answers

    What is a common characteristic of criminal hackers?

    <p>They act quickly once they penetrate a system</p> Signup and view all the answers

    Why are IDS / IPS systems less effective against criminal hackers?

    <p>They are less effective against targeted attacks</p> Signup and view all the answers

    What is the primary purpose of an Intrusion Detection System?

    <p>To detect and provide warnings of unauthorized access attempts</p> Signup and view all the answers

    What is the primary function of a Sensor in an IDS?

    <p>To collect data from the network and forward it to the analyzer</p> Signup and view all the answers

    What is the role of an Analyzer in an IDS?

    <p>To determine if an intrusion has occurred</p> Signup and view all the answers

    What type of input can a Sensor receive in an IDS?

    <p>Any part of a system that could contain evidence of an intrusion</p> Signup and view all the answers

    What is the purpose of the Reporting function in an IDS?

    <p>To generate conclusions and act on analysis results</p> Signup and view all the answers

    What is the primary difference between an IDS and a Firewall?

    <p>IDS detects attacks, while Firewalls prevent them</p> Signup and view all the answers

    What is the primary benefit of using an IDS in addition to a Firewall?

    <p>To add an additional layer of security</p> Signup and view all the answers

    What are the three logical components of an IDS?

    <p>Sensors, Analyzers, and Reporters</p> Signup and view all the answers

    What is the primary purpose of the output of an IDS component?

    <p>To indicate that an intrusion has occurred</p> Signup and view all the answers

    What is a key characteristic of an IDS's user interface?

    <p>It may be equivalent to a manager, director, or console component</p> Signup and view all the answers

    Which of the following is NOT a requirement for an IDS?

    <p>It must be able to predict future intrusions</p> Signup and view all the answers

    What is the primary purpose of an IDS's ability to resist subversion?

    <p>To ensure the IDS can monitor itself and detect modifications</p> Signup and view all the answers

    What is the consequence of an IDS's ability to provide graceful degradation of service?

    <p>If some components of the IDS stop working, the rest will be affected as little as possible</p> Signup and view all the answers

    What is a key benefit of an IDS's ability to adapt to changes in system and user behavior over time?

    <p>It can better respond to changing security threats</p> Signup and view all the answers

    What is a key requirement for an IDS in terms of its operation?

    <p>It must be able to run continually with minimal human supervision</p> Signup and view all the answers

    What is the primary purpose of an IDS's ability to be configured according to the security policies of the system being monitored?

    <p>To ensure the IDS is aligned with the system's security policies</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser