暗記メーカー
ログイン
LEC 7
  • Julia Cristine Tadeo

  • 問題数 65 • 6/22/2024

    記憶度

    完璧

    9

    覚えた

    24

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    collect statistical summaries of normal traffic to form baseline

    statistical anomaly based

  • 2

    IDS detects attacks and transfers to simulated environment

    padded cell

  • 3

    classification of IDPS alerts

    alarm filtering

  • 4

    attacker change the format and/or timing of activities to avoid being detected

    evasion

  • 5

    report to a hierarchical central facility, one of the more effective methods

    partially distributed

  • 6

    alarms events that are accurate but don't pose threats

    noise

  • 7

    types of IDPS

    network based, host-based

  • 8

    can monitor multiple computer simultaneously

    host-based

  • 9

    act as quality control for security design and administration

    IDPS

  • 10

    event that triggers alarms in event of real attack

    true attack stimulus

  • 11

    focused on protection network information assets

    network based

  • 12

    alarm activates in the absence of an actual attack

    false positive

  • 13

    based on frequency on which network activities take place

    statistical anomaly based

  • 14

    indication that attack is happening

    alarm or alert

  • 15

    what is active on computer

    port scanners

  • 16

    procedures and systems that identify system intrusions

    intrusion detection

  • 17

    help find vulnerabilities in system

    scanning and analysis tools

  • 18

    wireless, monitors packets, looks for attack patterns

    network based

  • 19

    two dominate methodologies

    signature-based, statistical-anomaly approach

  • 20

    tracks interaction between users and applications

    application based

  • 21

    consist of honey pot or padded cell and alarm

    trap and trace systems

  • 22

    measure of IDPS ability to correctly detect and identify type of attacks

    confidence value

  • 23

    opposite of centralized

    fully distributed

  • 24

    ability to dynamically modify configuration in response to environmental activity

    site policy awareness

  • 25

    collection of honey pots

    honey net

  • 26

    adjusting an IDPS

    tuning

  • 27

    activities that deter an intrusion

    intrusion prevention

  • 28

    all IDS control functions are implemented and managed in a centralized location

    centralized

  • 29

    looks for patterns signatures in log files

    log file monitors

  • 30

    encourages attacks against themselves

    honey pots

  • 31

    event triggers alarm - no real attack

    false attack stimulus

  • 32

    monitors and analyzes wireless network

    wireless NIDPS

  • 33

    examines data traffic in search of patterns that match known signature

    signature-based

  • 34

    classifies files in categories and applies various notification actions based on rules

    host-based

  • 35

    lure potential attackers away from critical systems

    honey pots

  • 36

    scanning and analysis tools

    port scanners, firewall analysis tools, operating system detection tools, vulnerability scanners, packet sniffers

  • 37

    generally accepted combination

    intrusion detection and prevention system

  • 38

    validation of users identity

    authentication

  • 39

    control strategies

    centralized, partially distributed, fully distributed

  • 40

    besides on computer or appliance connected to a segment of organization network

    network based

  • 41

    All control functions apply that the physical location of each ID is component

    fully distributed

  • 42

    focused on protection server of host's information assets

    host-based

  • 43

    similar to NIDS, reviews logs

    log file monitors

  • 44

    grouping almost identical alarms happening at close to the same time

    alarm clustering and compaction

  • 45

    able to look at multiple log files from different systems

    log file monitors

  • 46

    intrusion detection and prevention system terminologies

    alarm or alert, evasion, false attack stimulus, false negative, false positive, noise, site policy, site policy awareness, true attack stimulus, tuning, confidence value, alarm filtering, alarm clustering and compaction

  • 47

    packet structure

    protocol verification

  • 48

    contains pseudo services the emulated well-known services

    honey net

  • 49

    allow system admin to see what the attacker sees

    scanning and analysis tools

  • 50

    resides on a particular computer or server and monitors traffic only on that system

    host-based

  • 51

    works like a burglar alarm

    intrusion detection system

  • 52

    Packet use

    application verification

  • 53

    commercially available in late 1990

    intrusion detection system

  • 54

    protected honey pot

    padded cell

  • 55

    decoy systems

    honey pots

  • 56

    activities finalized the restoration of operations to a normal state and activities seek to identify the source and method of attack for prevention

    intrusion correction

  • 57

    type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with the intent to do malicious harm

    intrusion

  • 58

    also known as system integrity verifiers

    host-based

  • 59

    known signatures in network-based

    protocol verification, application verification

  • 60

    individual agents respond to local threats

    partially distributed

  • 61

    rules and configuration guidelines governing the implementation and operation of IDPS

    site policy

  • 62

    detect intrusion and trace incident back

    trap and trace systems

  • 63

    examines application for abnormal events

    application based

  • 64

    connects honey pots on a subnet

    honey net

  • 65

    failure of IDPS to react to attack

    false negative