An AIDPS is sometimes viewed as an extension to a proxy server, providing what additional
countermeasures Correct Ans-- Monitoring file system usage
- Monitoring dynamic memory utilization
- Identifying changes to system configuration files
What are advantages of AIDPSes Correct Ans-- Is at application end-point, so encrypted
data may be available
- Can observe interaction between application and user
Our text provides multiple categories of important considerations when selecting an IDPS.
They include Correct Ans-- What are your security goals and objectives?
- What is your systems environment?
What is your existing security policy?
Our text provides categories of important IDPS features / characteristics, which include
Correct Ans-- Is the product sufficiently scalable?
- How has the product been tested?
- Is the product designed to evolve?
- What level of user expertise is required?
The process of examining and verifying network traffic for invalid (malformed) data packets is
Correct Ans-Protocol stack verification
, CSE 4471 - Final Exam Questions and Answers
Confidence value Correct Ans-A score assigned to a specific IDPS alert indicating the
likelihood that the alert is valid
Honeypot Correct Ans-A decoy system designed to distract potential attackers from critical
systems
Footprinting Correct Ans-The process of obtaining basic organizational infrastructure
information, such as a list of active host addresses
Fingerprinting Correct Ans-Obtaining a list of active ports on all organizational servers
Regression Testing Correct Ans-Testing what has been tested previously
Hardness Testing Correct Ans-Aggressively testing new or enhanced functions and features
Enticement Correct Ans-An attractive lure designed to provoke interest
Entrapment Correct Ans-Active encouragement of illegal behavior
An attack on information assets in which an attack agent gains or attempts to gain entry into a
network or system to disrupt or cause other harm Correct Ans-Intrusion