FUNDAMENTALS EXAM 2
A(n) __________ IDPS is focused on protecting network information
assets. - ANSWERS-Network-based
__________ benchmark and monitor the status of key system files
and detect when an intruder creates, modifies, or deletes monitored
files. - ANSWERS-HIDPSs
Three methods dominate the IDPSs detection methods:
____________________-based approach, statistical anomaly-based
approach or the stateful packet inspection approach. - ANSWERS-
signature
To use a packet sniffer legally, an administrator only needs permission
of the organization's top computing executive. - ANSWERS-False
The Metasploit Framework is a collection of exploits coupled with an
interface that allows the penetration tester to automate the custom
exploitation of vulnerable systems. - ANSWERS-True
Port explorers are tools used by both attackers and defenders to
identify (or fingerprint) the computers that are active on a network, as
well as the ports and services active on those computers, the functions
, and roles the machines are fulfilling, and other useful information.
_________________________ - ANSWERS-False
Alarm events that are accurate and noteworthy but do not pose
significant threats to information security are called noise.
_________________________ - ANSWERS-True
HIDPSs are also known as system ____________________ verifiers.
- ANSWERS-integrity
Your organization's operational goals, constraints, and culture should
not affect the selection of the IDPS and other security tools and
technologies to protect your systems. - ANSWERS-False
____________________ is the process of attracting attention to a
system by placing tantalizing bits of information in key locations. -
ANSWERS-enticement
A HIDPS can monitor systems logs for predefined events. -
ANSWERS-True
A __________ vulnerability scanner listens in on the network and
identifies vulnerable versions of both server and client software. -
ANSWERS-passive