HIDPSs - Answers ____ benchmark and monitor the status of key system files and detect when
an intruder creates, modifies, or deletes monitored files.
False Attack Stimulus - Answers ____ is an event that triggers an alarm when no actual attack is
in progress.
Fingerprinting - Answers The systematic survey of a targeted organization's Internet addresses
collected during the footprinting phase to identify the network services offered by the hosts in
that range.
Network-based IDPS - Answers focused on protecting network information assets
Passive Vulnerability Scanner (PVS) - Answers Monitors the network in real-time, continuously
looking for new hosts, applications and new vulnerabilities without requiring the need for active
scanning.
Incident Detection Protocol System (IDPS) - Answers Works like a burglar alarm in that it
detects a violation (some system activities analogous to and opened or broken window) and
activates and alarm.
Padded cell system - Answers A protected honeypot that cannot be easily compromised.
clipping level - Answers A configured baseline threshold above which violations will be recorded.
SPAN Port - Answers Switched Port Analyzer--Receives traffic forwarded from other switch
ports. Capable of viewing all the traffic that moves through an entire device.
IDPSs - Answers Can help the organization protect its assets when its networks and systems
are exposed to known vulnerabilities.
Entrapment - Answers The action of luring an individual into committing a crime to get a
conviction.
Idle scanning - Answers Will allow and Nmap user to bounce and scan across a firewall by using
one of the idle DMZ hosts as the initiator of the scan
To use a packet sniffer legally the administrator must: - Answers Be on a network that the
organization owns, be under direct authorization of the networks owners, have knowledge and
consent of the contents creators. (All of the above)
Monitoring Port - Answers Also known as a switched port analysis (SPAN) port or mirror port, a
specially configured connection on a network device that can view all the traffic that moves
through the device.
Encryption - Answers To secure data in transit across and network, organizations my use __ to
, be assured of the content privacy.
Active Vulnerability Scanner - Answers An application initiates traffic on the network in order to
determine security holes.
Packet Sniffer - Answers Software or hardware used to collect data travelling over a network.
intercepts ,copies and interprets network traffic.
Centralized IDPS - Answers control strategy where all IDPS control functions are implemented
and managed in a central location
Destructive - Answers Some vulnerability scanners feature a class of attacks called___, that are
so dangerous they should only be used in a lab environment.
Back Hack - Answers Under the guise of justice, some less scrupulous administrators may be
tempted to ____________________, or hack into a hacker's system to find out as much as possible
about the hacker.
HIDPSs - Answers are also known as system integrity verifiers.
Signatures - Answers To determine whether an attack has occurred or is underway, NIDPSs
compare measured activity to known ___ in their knowledge base.
Inline Sensor - Answers An IDPS sensor intended for network perimeter use and deployed in
close proximity to a perimeter firewall to detect incoming attacks that could overwhelm the
firewall.
Honeypots - Answers decoy systems designed to lure potential attackers away from critical
systems
Smart IDPS - Answers ___ can adapt its reactions in response to administrator guidance over
time and circumstances of the current local environment.
HTTP Port Number - Answers 80
Telnet Port Number - Answers 23
SMTP Port Number - Answers 25
DNS Port Number - Answers 53
POP3 Port Number - Answers 110
SNMP Port Number - Answers 161
Echo Port Number - Answers 7
FTP Port Number - Answers 20, 21