Intrusion Detection and Prevention Systems
61 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A(n) works like a burglar alarm in that it detects a violation and activates an alarm.

IDPS

What is a major advantage of a Heuristic-based IDS?

It can detect Unknown Attacks.

What is the primary characteristic of a signature-based IDS?

It uses predefined patterns of known threats to identify intrusions.

What is the primary function of a SIEM system?

<p>To collect, analyze, and respond to security events and incidents.</p> Signup and view all the answers

Intrusion detection consists of procedures and systems that identify system intrusions and take steps to limit the intrusion and return operations to a normal state when an intrusion is detected.

<p>False</p> Signup and view all the answers

An IDPS can be configured to call a phone number or perform another type of signal or message.

<p>True</p> Signup and view all the answers

A false positive is the failure of an IDPS system to react to an actual attack event.

<p>False</p> Signup and view all the answers

NIDPSs can reliably ascertain whether an attack was successful.

<p>False</p> Signup and view all the answers

HIDPSs are also known as system integrity verifiers.

<p>True</p> Signup and view all the answers

An HIDPS can monitor system logs for predefined events.

<p>True</p> Signup and view all the answers

An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDPS.

<p>True</p> Signup and view all the answers

An HIDPS is optimized to detect multihost scanning, and it is able to detect the scanning of non-host network devices, such as routers or switches.

<p>False</p> Signup and view all the answers

The anomaly-based IDPS collects statistical summaries by observing traffic that is known to be normal.

<p>True</p> Signup and view all the answers

IDPS responses can be classified as active or passive.

<p>True</p> Signup and view all the answers

A passive IDPS response is a definitive action automatically initiated when certain types of alerts are triggered.

<p>False</p> Signup and view all the answers

The Simple Network Management Protocol contains trap functions, which allow a device to send a message to the SNMP management console indicating that a certain threshold has been crossed, either positively or negatively.

<p>True</p> Signup and view all the answers

In order to determine which IDPS best meets an organization's needs to consider the system environment, security goals and objectives, and the existing security policy.

<p>True</p> Signup and view all the answers

Your organization's operational goals, constraints, and culture should not affect the selection of the IDPS and other security tools and technologies to protect your systems.

<p>False</p> Signup and view all the answers

Among the considerations in evaluating an IDPS are the product's scalability, testing, support provisions, and ability to provide information on the source of attacks.

<p>False</p> Signup and view all the answers

A fully distributed IDPS control strategy is an IDPS implementation approach in which all control functions are applied at the physical location of each IDPS component.

<p>True</p> Signup and view all the answers

Security tools that provide decoy systems designed to lure potential attackers away from critical systems include honeypots, honeynets, and padded cell systems.

<p>True</p> Signup and view all the answers

An IDPS helps to secure networks by identifying where the network needs securing.

<p>False</p> Signup and view all the answers

Once the OS is known, the vulnerabilities to which a system is susceptible can more easily be determined.

<p>True</p> Signup and view all the answers

The Metasploit Framework is a collection of exploits coupled with an interface that allows the penetration tester to automate the custom exploitation of vulnerable systems.

<p>True</p> Signup and view all the answers

A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

<p>False</p> Signup and view all the answers

Passive scanners are advantageous in that they can find client-side vulnerabilities that are typically not found by active scanners.

<p>True</p> Signup and view all the answers

To use a packet sniffer legally, the administrator only needs to be on a network that the organization owns, and have authorization of the network's owners.

<p>False</p> Signup and view all the answers

Alarm filtering and compaction is the process of grouping almost identical alarms that occur nearly at the same time into a single higher-level alarm.

<p>False</p> Signup and view all the answers

A(n) event is an indication that a system has just been attacked or is under attack.

<p>False</p> Signup and view all the answers

Alarm events that are accurate and noteworthy but do not pose significant threats to information security are called noise.

<p>True</p> Signup and view all the answers

Avoidance is the process by which an attacker changes the format and/or timing of activities to avoid being detected by an IDPS.

<p>False</p> Signup and view all the answers

The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress.

<p>False</p> Signup and view all the answers

A(n) known vulnerability is a published weakness or fault in an information asset or its protective systems that may be exploited and result in loss.

<p>True</p> Signup and view all the answers

The activities that gather public information about the organization and its network activities and assets is called fingerprinting.

<p>False</p> Signup and view all the answers

In the process of protocol application verification, the NIDPSS look for invalid data packets.

<p>False</p> Signup and view all the answers

A HIDPS is also known as a system validity verifier.

<p>False</p> Signup and view all the answers

A(n) NIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.

<p>False</p> Signup and view all the answers

Preconfigured, predetermined attack patterns are called signatures.

<p>True</p> Signup and view all the answers

A(n) log file monitor is similar to an NIDPS.

<p>True</p> Signup and view all the answers

The centralized IDPS implementation approach occurs when all detection functions are managed in a central location.

<p>False</p> Signup and view all the answers

A(n) partially distributed IDPS control strategy combines the best of other IDPS strategies.

<p>True</p> Signup and view all the answers

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet.

<p>True</p> Signup and view all the answers

A hardened honeypot is also known as a protected cell system.

<p>False</p> Signup and view all the answers

The disadvantages of using the honeypot or padded cell approach include the fact that the technical implications of using such devices are not well understood.

<p>False</p> Signup and view all the answers

When using trap-and-trace, the trap usually consists of a honeypot or padded cell and a(n) packet sniffer.

<p>False</p> Signup and view all the answers

Enticement is the illegal and unethical action of luring an individual into committing a crime to get a conviction.

<p>False</p> Signup and view all the answers

Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization.

<p>False</p> Signup and view all the answers

For Linux or BSD systems, a tool called "Sam Spade" allows a remote individual to “mirror” entire Web sites.

<p>False</p> Signup and view all the answers

Port scanners are tools used both by attackers and defenders to identify (or footprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful information.

<p>False</p> Signup and view all the answers

A(n) port is the equivalent of a network channel or connection point in a data communications system.

<p>True</p> Signup and view all the answers

A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server and client software.

<p>False</p> Signup and view all the answers

Which of the following ports is commonly used for the HTTP protocol?

<p>80</p> Signup and view all the answers

The ability to detect a target computer's is very valuable to an attacker.

<p>operating system</p> Signup and view all the answers

Testing is a straightforward testing technique that looks for vulnerabilities in a program or protocol by feeding random input to the program or a network running the protocol.

<p>Fuzz</p> Signup and view all the answers

Some vulnerability scanners feature a class of attacks called that are so dangerous they should only be used in a lab environment.

<p>destructive</p> Signup and view all the answers

A vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

<p>passive</p> Signup and view all the answers

A(n) is a software program or hardware appliance that can intercept, copy, and interpret network traffic.

<p>packet sniffer</p> Signup and view all the answers

To use a packet sniffer legally, the administrator must

<p>all of these are correct</p> Signup and view all the answers

How does a signature-based IDPS differ from a behavior-based IDPS?

<p>A signature-based system looks for patterns of behavior that match a library of known behaviors. A behavior-based system watches for activities that suggest an alert-level activity is occurring, based on sequences of actions or the timing between otherwise unrelated events.</p> Signup and view all the answers

What is a SIEM and what is its primary purpose?

<p>A security information and event management (SIEM) system is an information management system specifically tasked to collect and correlate events and other log data from a number of servers or other network devices for the purpose of interpreting, filtering, correlating, analyzing, storing, reporting, and acting on the resulting information.</p> Signup and view all the answers

What is network footprinting and how is it related to network fingerprinting?

<p>Footprinting is organized research of the Internet addresses owned or controlled by a target organization. The attacker uses public Internet data sources to perform keyword searches that identify the organization's Web pages. Web pages usually contain information about internal systems, the people who develop the Web pages, and other tidbits that can be used for social engineering attacks. The fingerprinting phase uses the TCP/IP address ranges that were collected during the footprinting phase to identify the network services offered by the hosts in that range.</p> Signup and view all the answers

Study Notes

Intrusion Detection and Prevention Systems (IDPS)

  • IDPS systems work like burglar alarms, detecting violations and activating alarms
  • Heuristic-based IDS can detect unknown attacks
  • Signature-based IDS uses predefined patterns to identify known threats
  • SIEM systems collect, analyze, and respond to security events and incidents
  • Intrusion detection involves procedures and systems that identify intrusions and restore normal operations
  • IDPS can configure to call a phone number or perform another signal
  • A false positive is a failure of an IDPS system to react to a real attack
  • NIDPSS (Network-based IDPSs) are also known as system integrity verifiers
  • HIDPSS (Host-based IDPSs) can monitor system logs for predictable events
  • HIDPSs can detect local events that would elude a network-based system
  • HIDPSs are optimized for multihost scanning, and can detect non-host devices like routers or switches
  • Anomaly-based IDPSs collect statistical summaries by observing normal traffic

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

This quiz explores Intrusion Detection and Prevention Systems (IDPS), highlighting their functionality as security measures akin to burglar alarms. It covers different types of IDS, including heuristic and signature-based systems, as well as the roles of SIEM in security event management. Test your knowledge on how these systems work to detect and respond to various cyber threats.

More Like This

Use Quizgecko on...
Browser
Browser