Computer Security Quiz 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

An intruder can also be referred to as a hacker or cracker. T/F?

True

2
New cards

Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified. T/F?

True

3
New cards

The primary purpose of an IDS is to detect intrusions, log suspicious events, and send alerts. T/F?

True

4
New cards

Signature-based approaches attempt to define normal, or expected, behavior, whereas anomaly approaches attempt to define proper behavior. T/F?

False

5
New cards

Anomaly detection has a low false alarm rate. T/F?

False

6
New cards

An inline sensor monitors a copy of network traffic; the actual traffic does not pass through the device. T/F?

False

7
New cards

Network-based intrusion detection makes use of signature detection and anomaly detection. T/F?

True

8
New cards

___ are either individuals or members of a larger group of outsider attackers who are motivated by social or political causes.

Activists

9
New cards

A ___ is the unauthorized act of bypassing the security mechanisms of a system.

Security intrusion

10
New cards

The __ is responsible for determining if an intrusion has occurred.

Analyzer

11
New cards

A (n) ____ is a hacker with minimal technical skill who primarily uses existing attack toolkits.

Beginner

12
New cards

The purpose of the __ module is to collect data on security-related events on the host and transmit these to the central manager.

Host agent

13
New cards

A(n) __ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is underway.

DDI

14
New cards

A ___ honeypot is a software package that emulates particular IT services or systems well enough to provide a realistic initial interaction, but does not execute a full version of those services or systems.

Low-interaction

15
New cards

____ is a security service that monitors and analyzes system events for the purpose of finding, and providing real-time warning of attempts to access system resources in an unauthorized manner.

Intrusion detection

16
New cards

An IDS comprises three logical components: analyzers, user interface, and _____.

sensors

17
New cards

Copying a database containing credit card numbers, viewing sensitive data without authorization, and guessing and cracking passwords are examples of ___.

intrusion activity

18
New cards

__ detection techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious.

Rule-based

19
New cards

A __ IDS monitors traffic at selected points on a network or interconnected set of networks.

Network-based

20
New cards

The functional components of an ___ are: data source, sensor, analyzer, administration, manager, and operator.

IDS