Exam (elaborations) SEC311/SEC 311 DeVry University, Keller Graduate School of Management > SEC 311 Week 6 Quiz Answered 2021Fall
(TCO 2, 4) Signature based IDS attacks easily. Group of answer choices can detect known malware can detect unknown active malware cannot detect zero-day can detect polymorphic Question 2 3 pts (TCO 2, 4) Usually, running an Nmap scan in a slow mode will avoid Group of answer choices detection. false negative. false positive. reduced collision. (TCO 2, 4) A firewall can be used to filter traffic on specific Group of answer choices ports. authentication methods independent of the ports. query structures. buffer overflow processes. Question 1 3 pts Question 3 3 ptsQuestion 4 3 pts (TCO 2, 4) Snort is considered which of the following? Group of answer choices HIPS NIPS HIDS NIDS (TCO 2, 4) This attack occurs when an IDS accepts packets that are discarded by the host. Group of answer choices Evasion Session splicing Insertion False positives (TCO 5) LIFO is used by Group of answer choices queues. stacks. lists. links. Question 5 3 pts Question 6 3 ptsQuestion 7 3 pts (TCO 5) can be used by an attacker to test a web application for buffer-overflow conditions. Group of answer choices EMET BOU TIED /GS (TCO 5) This worm exploited the .ida buffer overflow. Group of answer choices Nimda TIED Melissa Code Red (TCO 5) This type of virus can change its signature every time it replicates its infection to a new file. Group of answer choices Polymorphic Monomorphic Multimorphic Single morph Question 8 3 pts Question 9 3 ptsQuestion 10 3 pts (TCO 5) The I LOVE YOU bug is an example of a Group of answer choices macro infection. micro infection. mini infection. maxi infection.
Escuela, estudio y materia
- Institución
- Devry University-Chicago
- Grado
- SEC311/SEC 311
Información del documento
- Subido en
- 8 de diciembre de 2021
- Número de páginas
- 5
- Escrito en
- 2021/2022
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
sec311
-
sec 311 week 6 quiz
-
week 6
-
usually
-
signature based ids attacks easily
-
running an nmap scan in a slow mode will avoid group of answer choices detection