5010 Midterm Quiz Midterm
True or False: Intrusion detection is the process of monitoring and analysing events occurring in a computer system or network.
True
False
Select a sign that is NOT an event
Threat of violation of systems
Breaches of policy
Indicators of compromise
Client forgets password
Select the option which is NOT an incident
Someone accesses a site they aren't supposed to
Malware
Unauthorized access
Misuse of privilege and systems
Unexpected changes
True or False: Incidents are always malicious
True
False
IDS automates the proccess of ___________ incidents
Preventing
Detecting
Preventing and detecting
Detect and block
True or False: IPS automate the process of detecting incidents and attempt to stop the incident form occurring.
True
False
True or False: IDPS can identify miconfigs of security appliances
True
False
True or False: IDPS can NOT identify policy problems
True
False
Select the method on how NOT to record event information
Screenshot
Locally
Remotely
SIEM
Enterprise Management Systems
Select 4 ways admins can be notified of important alerts
Email
Phone Call
IDPS console
Teams message
Syslog
SNMP
IPS technologies differ from IDS by one characteristic: IPS can respond to a detected threat and attempt to ______________ an incident.
Detect
Quarantine
Isolate
Prevent
True or False: IDPS solutions provides 100% accurate detection and is aware of zero-day threats
True
False
An attacker sent out an attachment in an email but it was detected. What detection method was used
Anamoloy
Signature
Stateful
Stateless
True or False: Signature-based detection is effective for known threats and bad for unknown threats
True
False
What detection method reuqires the creation of profiles
Stateful
Signature
Network
Anamoly
Where would Network-Based IDPS be deployed at? (Select 3)
In a server
Network Boundaries
VPN/Remote Access servers
Wireless Controllers
In a phone
In a laptop
True or False: Wireless IDPS systems do not look for suspicious activity from the upper OSI layers
True
False
Which of the following is NOT a threath detected by Network Behavior Analysis (NBA)
DoS
User forgot password
DDoS
Worms/Malware
Policy violations
____________ monitors a signle host for signs of suspicious activity
NBA
Network-Based
Host Based
Stateless
One reason a network intruder may target an IDPS system is to access the information it contains about the network
True
False
Wireless IDPS is used to identify which of the following threats
Packet floods
AP Spoofing
Beacon swapping
Rogue SSIDs
Identify the benefits of using a seperate management network for a network-based IDPS solution
The IDPS can drop traffic that is considered malicious
The IDPS solution is less likely to be affected by DoS/DDoS attacks on organziations network
Management traffic is not included in IDPS logs
It helps conceal the existence of the IDPS system to potential intruders
Which of the following capabiltities of network-based IDPS require turning to improve accuracy?
Information gathering
Logging
Prevention
Detection
A ____ is the term used for the device that captures traffic in network-based IDPS.
Agent
Sensor
An ______ is software installed on a machine for host-based IDPS.
Agent
Sensor
A dedicated VLAN can be used to seperate IDPS compnents but they are not protected against: (Choose 1)
DoS/DDos attacks
Worms
Malware
Ransomware
It is best practice to store data both ____ and _____
Locally and on SIEM
Locally and remotely
Locally
Remotely
True or False: Accurate time is NOT important for log correlation
True
False
_________ are used to reduce false-positives from benign activity from trusted hosts.
Blacklists
Hot Lists
Whitelists
Select 2 questions an admin may ask before deloying the archietecture of IDPS:
How much RAM is needed
How much power supply is needed
Where sensors and/or agents should be placed
How reliable the solution should be
True or False: If available, organizations should deploy the IDPS solution in a testing environment before deploying them to a production network.
True
False
True or False: Right when IDPS is deployed, there will be a lot of detections so no tuning would be required
True
False
What are two ways to harden the security on IDPS components? (Select the best 2 answers)
Separate accounts for each IDPS administrator with limited privileges
Roll out IDPS components all disabled
Ensure the compnents are physically secured
Access to the IDPS management functions should be limited to only the hosts that require it.
True or False: Programming skills is a skill and admin should have to maintain an IDPS solution
True
False
______ is used to improve the detection accuracy of the IDPS
Logs
Tuning
Prevention System
Detection System
______ is the primary protocol suite used on networks today
UDP
TCP
IP
TCP/IP
Which of the following is NOT a layer on the TCP/IP model?
Session
Application
Transport
IP Layer
Hardware
What network protocol is used when reliable delivery is not necessary
TCP
UDP
BGP
STP
What mode must an interface be put on when trying to monitor network traffic
Shut
On
Passive
Promiscuous
True or False: Appliance and Software are the two formats sensors are available in
True
False
What are two ways to protect yourself when trying to manage your sensor
Use a VLAN
Be in a locked room
Use a VPN
Install virus blocker on the PC
_________ is deployed so that network traffic that is being monitored must pass through the sensor
Passive
Spaning Port
Inline
Network Tap
What sensor placement method creates copies of the network
Inline
Passive
What method of copying network traffic is NOT ideal for high traffic throughput
Network Tap
Spanning Port
Which method of copying network traffic allows for a copy of network traffic to be taken from any port, anywhere in the organization.
Network Tap
Spanning Port
What system is used to direct traffic to a sensor
Port pushing
Traffic Loader
IDS Load Balancer
Spanning Tree
True or False: Splitting traffic to multiple sensors could cause a reduction in detection accuracy.
True
False
True or False: Information gathering consists of TCP/UDP ports and header information being used to detemine a OS running on a host
True
False
Passive Fingerprinting is:
Findinf rogue devices based on IP and MAC
Rogue MAC addresses
TCP/UDP ports and header information used to determine OS on a host
Rogue network traffic
Select one data type that is NOT used to log IDPS
Firewall Notifications
Timestamps
Connection/Session IDs
Event/Alrt type
Alert Rating
TCP/IP in use
True or False: Network-based IDPS can not perform packet captures of the onnection that caused an alert to occur
True
False
What layer would you see: Banner grabbing, buffer overflows, format string attacks, password guessing, malware transmission
Application
Transport
Network
What layer would you see: Port scanning, unusual packet fragmentation, SYN floods
Application
Transport
Network
What layer would you see: spoofed IP addresses, illegal IP header values
Application
Transport
Network
True or False: Network-based IDPS can rate an attack on how likely it is to succeed.
True
False
Which of 1 of the following is NOT a limation of network-based IDPS
Analysing encrypted traffic
Handling traffic loads
Withstanding attacks in the IDPS system
Handling low traffic loads
What is stealth mode?
A system to prevent attackers from accessing the system
A system to prevent attackers from accessing your organizations servers
Prevent attackers from identifying that IDPS scanning is in use
A system to stop attackers
Which sensor has the ability to be configured when there is high-laod
Inline
Passive
________ is a technique attackers can use on an IDPS that attempts to disguise malicious traffic by generating a large number of alerts at the same time
Stealth Mode
Blinding
Attacking
Pushing
True or False: WEP is a wireless security that is well-known and should be used over 802.11i
True
False
True or False: WPA3 is the current standard
True
False
What is an example of a Station (STA) in WLAN
Cell phone
Network Switch
IP Phone
PC with no WIFI card
Which 802.11 architecture mode allows STA's communicate directly with no APs
Ad Hoc
Infrastructure
True or False: Wireless attacks require an attacker to be close to the wireless network
True
False
Which wireless sensor s completely passive and monitors radio frequency waves to sniff traffic?
Bundled with an AP/WLC
Dedicated
Network Architecture
Which wireless deployment type is to be used while in motion to find rogue APs
Mobile
Fixed
Added IDPS functionality in a wireless architecture is done in what form
Dedicated
Bundled with an AP/WLC
True or False: Wireless sensors need to be deployed in locations that allow them to monitor the RF range of the organization's WLAN
True
False
Most IDPS sensors create and maintain an inventory of observed devices including: Select 3
APs
WLC
WLANS
Ad Hoc peers
What detection method can detect unusual WLAN usage
Signature
Anamoly
Stateless
Stateful
True or False: Wireless IDPS is generally more accurate than other types of IDPS
True
False
{"name":"5010 Midterm Quiz Midterm", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"True or False: Intrusion detection is the process of monitoring and analysing events occurring in a computer system or network., Select a sign that is NOT an event, Select the option which is NOT an incident","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
Nameri s koq patka ot kursa si podhojdash (samo podbrani ;))
7480
The epic gamer.Q
1050
Restul de grile PAI
63320
The Ultimate Channel Quiz!
14711
What 3 Elements Do All Macromolecules Share? Free
201022195
Manual Material Handling Equipment - Examples
201021657
12 Tenses - Free English Grammar Practice
201024040
Should I Go Blonde? Free: Blonde or Brunette
201020448
Meniscus Graduated Cylinder - Avoid Parallax Error
201018491
Muscle Car - Which Classic Ride Matches You?
201019307
Which Statement Best Describes the Role of Roman Women?
201019211
Texas Driver Handbook Questions and Answers - Free
201018491