100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Infosec Final Exam Questions and Answers Already Passed Latest Update

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
29-09-2025
Written in
2025/2026

Infosec Final Exam Questions and Answers Already Passed Latest Update HIDPSs - Answers ____ benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files. False Attack Stimulus - Answers ____ is an event that triggers an alarm when no actual attack is in progress. Fingerprinting - Answers The systematic survey of a targeted organization's Internet addresses collected during the footprinting phase to identify the network services offered by the hosts in that range. Network-based IDPS - Answers focused on protecting network information assets Passive Vulnerability Scanner (PVS) - Answers Monitors the network in real-time, continuously looking for new hosts, applications and new vulnerabilities without requiring the need for active scanning. Incident Detection Protocol System (IDPS) - Answers Works like a burglar alarm in that it detects a violation (some system activities analogous to and opened or broken window) and activates and alarm. Padded cell system - Answers A protected honeypot that cannot be easily compromised. clipping level - Answers A configured baseline threshold above which violations will be recorded. SPAN Port - Answers Switched Port Analyzer--Receives traffic forwarded from other switch ports. Capable of viewing all the traffic that moves through an entire device. IDPSs - Answers Can help the organization protect its assets when its networks and systems are exposed to known vulnerabilities. Entrapment - Answers The action of luring an individual into committing a crime to get a conviction. Idle scanning - Answers Will allow and Nmap user to bounce and scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan To use a packet sniffer legally the administrator must: - Answers Be on a network that the organization owns, be under direct authorization of the networks owners, have knowledge and consent of the contents creators. (All of the above) Monitoring Port - Answers Also known as a switched port analysis (SPAN) port or mirror port, a specially configured connection on a network device that can view all the traffic that moves through the device. Encryption - Answers To secure data in transit across and network, organizations my use __ to be assured of the content privacy. Active Vulnerability Scanner - Answers An application initiates traffic on the network in order to determine security holes. Packet Sniffer - Answers Software or hardware used to collect data travelling over a network. intercepts ,copies and interprets network traffic. Centralized IDPS - Answers control strategy where all IDPS control functions are implemented and managed in a central location Destructive - Answers Some vulnerability scanners feature a class of attacks called___, that are so dangerous they should only be used in a lab environment. Back Hack - Answers Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker's system to find out as much as possible about the hacker. HIDPSs - Answers are also known as system integrity verifiers. Signatures - Answers To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known ___ in their knowledge base. Inline Sensor - Answers An IDPS sensor intended for network perimeter use and deployed in close proximity to a perimeter firewall to detect incoming attacks that could overwhelm the firewall. Honeypots - Answers decoy systems designed to lure potential attackers away from critical systems Smart IDPS - Answers ___ can adapt its reactions in response to administrator guidance over time and circumstances of the current local environment. HTTP Port Number - Answers 80 Telnet Port Number - Answers 23 SMTP Port Number - Answers 25 DNS Port Number - Answers 53 POP3 Port Number - Answers 110 SNMP Port Number - Answers 161 Echo Port Number - Answers 7 FTP Port Number - Answers 20, 21 Intrusion Correction Activities - Answers finalize restoration of operations to a normal state Application Protocol Verification - Answers the higher-order protocols (HTTP, FTP, and Telnet) are examined for unexpected packet behavior or improper use. Intrusion - Answers occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system, almost always with the intent to do harm.

Show more Read less
Institution
Infosec
Course
Infosec









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Infosec
Course
Infosec

Document information

Uploaded on
September 29, 2025
Number of pages
10
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Infosec Final Exam Questions and Answers Already Passed Latest Update 2025-2026

HIDPSs - Answers ____ benchmark and monitor the status of key system files and detect when
an intruder creates, modifies, or deletes monitored files.

False Attack Stimulus - Answers ____ is an event that triggers an alarm when no actual attack is
in progress.

Fingerprinting - Answers The systematic survey of a targeted organization's Internet addresses
collected during the footprinting phase to identify the network services offered by the hosts in
that range.

Network-based IDPS - Answers focused on protecting network information assets

Passive Vulnerability Scanner (PVS) - Answers Monitors the network in real-time, continuously
looking for new hosts, applications and new vulnerabilities without requiring the need for active
scanning.

Incident Detection Protocol System (IDPS) - Answers Works like a burglar alarm in that it
detects a violation (some system activities analogous to and opened or broken window) and
activates and alarm.

Padded cell system - Answers A protected honeypot that cannot be easily compromised.

clipping level - Answers A configured baseline threshold above which violations will be recorded.

SPAN Port - Answers Switched Port Analyzer--Receives traffic forwarded from other switch
ports. Capable of viewing all the traffic that moves through an entire device.

IDPSs - Answers Can help the organization protect its assets when its networks and systems
are exposed to known vulnerabilities.

Entrapment - Answers The action of luring an individual into committing a crime to get a
conviction.

Idle scanning - Answers Will allow and Nmap user to bounce and scan across a firewall by using
one of the idle DMZ hosts as the initiator of the scan

To use a packet sniffer legally the administrator must: - Answers Be on a network that the
organization owns, be under direct authorization of the networks owners, have knowledge and
consent of the contents creators. (All of the above)

Monitoring Port - Answers Also known as a switched port analysis (SPAN) port or mirror port, a
specially configured connection on a network device that can view all the traffic that moves
through the device.

Encryption - Answers To secure data in transit across and network, organizations my use __ to

, be assured of the content privacy.

Active Vulnerability Scanner - Answers An application initiates traffic on the network in order to
determine security holes.

Packet Sniffer - Answers Software or hardware used to collect data travelling over a network.
intercepts ,copies and interprets network traffic.

Centralized IDPS - Answers control strategy where all IDPS control functions are implemented
and managed in a central location

Destructive - Answers Some vulnerability scanners feature a class of attacks called___, that are
so dangerous they should only be used in a lab environment.

Back Hack - Answers Under the guise of justice, some less scrupulous administrators may be
tempted to ____________________, or hack into a hacker's system to find out as much as possible
about the hacker.

HIDPSs - Answers are also known as system integrity verifiers.

Signatures - Answers To determine whether an attack has occurred or is underway, NIDPSs
compare measured activity to known ___ in their knowledge base.

Inline Sensor - Answers An IDPS sensor intended for network perimeter use and deployed in
close proximity to a perimeter firewall to detect incoming attacks that could overwhelm the
firewall.

Honeypots - Answers decoy systems designed to lure potential attackers away from critical
systems

Smart IDPS - Answers ___ can adapt its reactions in response to administrator guidance over
time and circumstances of the current local environment.

HTTP Port Number - Answers 80

Telnet Port Number - Answers 23

SMTP Port Number - Answers 25

DNS Port Number - Answers 53

POP3 Port Number - Answers 110

SNMP Port Number - Answers 161

Echo Port Number - Answers 7

FTP Port Number - Answers 20, 21

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
34
Member since
8 months
Number of followers
1
Documents
11081
Last sold
7 hours ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions