Search Header Logo
Untitled Presentation

Untitled Presentation

Assessment

Presentation

•

Computers

•

University

•

Practice Problem

•

Hard

Created by

abdul hadi

FREE Resource

39 Slides • 29 Questions

1

media

2

Multiple Choice

Which type of IDS system uses a predetermined set of rules or signatures to detect known malicious activity?

1

Anomaly-based system

2

Protocol-based system

3

Signature-based system

4

Behavior-based system

3

media

4

media

5

Multiple Choice

What triggers an alert in a SIEM system?

1

All data received

2

Data matching a known virus signature

3

Data exceeding an established threshold

4

Unauthorized access attempts

6

media

7

Multiple Choice

What is the purpose of NIPS/NIDS in network monitoring?

1

To monitor asset conditions

2

To detect and prevent network intrusions

3

To manage network performance

4

To analyze network traffic

8

media

9

Multiple Choice

What are the classifications of intrusion mentioned in the text?

1

Attempted Break-ins

2

Masquerade attacks

3

Denial of Service

4

Malicious Use

10

media

11

Multiple Choice

How does an Intrusion Detection System (IDS) differ from an Intrusion Prevention System (IPS)?

1

An IDS detects and alerts on potential intrusions, while an IPS can actively block or prevent them.

2

An IDS operates on the network layer, while an IPS operates on the application layer.

3

An IDS is used for physical security breaches, while an IPS is used for digital security breaches.

4

There is no difference; IDS and IPS are interchangeable terms.

12

media

13

Multiple Choice

What is a firewall and how does it enhance security?

1

A firewall enhances security by encrypting all network traffic.

2

A firewall enhances security by slowing down network performance.

3

A firewall enhances security by monitoring and controlling network traffic based on security rules, acting as a barrier between trusted and untrusted networks.

4

A firewall enhances security by allowing all network traffic without any restrictions.

14

media

15

Multiple Choice

A(n) ______________ _____________ ____________ detects anomalies with the aim of

catching hackers before they do real damage to a network.

1
Spam Filter (SF)
2
Antivirus Software (AS)
3
Intrusion Detection System (IDS)
4
Firewall System (FS)

16

media

17

Multiple Choice

What are the limitations of a firewall compared to an IDS?

1

Firewalls can detect all security breaches

2

Firewalls inspect all traffic content

3

Firewalls are less likely to be attacked than IDS

4

Firewalls cannot detect security breaches associated with traffic that does not pass through it

18

media

19

Multiple Choice

What is the primary goal of intrusion detection systems (IDS)?

1

To block all network traffic

2

To inspect all network activity and identify suspicious patterns

3

To monitor only outbound traffic

4

To prevent all system attacks

20

media

21

Multiple Choice

What are the main functions of an Intrusion Detection System as depicted in the diagram?

1

Monitor

2

Respond

3

Report

4

Analyze

22

media

23

Multiple Select

What are the two main functions of an Intrusion Detection System (IDS) as described in the text?

1

Monitor

2

Report

3

Analyze

4

Detect

24

media

25

Multiple Choice

What is the purpose of ID in reducing security risks?

1

To initiate mitigation activities

2

To provide risk-related information

3

To deal with incidents

4

To monitor security risks

26

media

27

Multiple Choice

What are the two approaches to Intrusion Detection mentioned in the image?

1

Preemptory

2

Reactionary

3

Proactive

4

Passive

28

media

29

Multiple Choice

What are the main functions of a Network-Based Intrusion Detection System (IDS)?

1

Monitoring network activity

2

Capturing packet headers

3

Comparing patterns with threats

4

Sending email notifications

30

media

31

Multiple Choice

What are the tools used in Host-based IDS?

1

Swatch

2

Log check

3

Mod_security

4

Tripwire

32

media

33

Multiple Choice

What is the difference between Rule Based / Misuse detection and Anomaly detection in network security?

1

Rule Based detection is faster

2

Anomaly detection can identify new attacks

3

Rule Based detection requires less data

4

Anomaly detection is less accurate

34

Multiple Choice

Which IDS method searches for intrusion or attack attempts by recognizing patterns or identifying entities listed in a database?

1

Anomaly-analysis-based IDS

2

Heuristics-based IDS

3

Stateful-inspection-based IDS

4

Signature-based IDS

35

Multiple Choice

What is the MOST common form of host-based IDS that employs signature or pattern-matching detection methods?

1

Anti-Virus

software

2

Motion Detectors

3

Firewall

4

Honeypots

36

Multiple Choice

____________ is an unusual activity in a group of otherwise normal activities.

1

Anomaly

2

Iteration

3

Parameter

4

Precision

37

media

38

Multiple Choice

What are the two types of response mentioned in the image?

1

Active

2

Passive

3

Reactive

4

Proactive

39

media

40

Multiple Choice

What is a threshold in the context of normal activity?

1

A value that represents the boundary of normal activity

2

A maximum number of attempts allowed

3

A type of network activity

4

A measure of file I/O activity

41

media

42

Multiple Choice

What does the rule "Alert tcp any any -> 192.168.1.0/24 111" specify in terms of packet examination?

1

It specifies the action to take

2

It specifies the destination IP

3

It specifies the protocol

4

It specifies the source IP

43

media

44

Multiple Choice

What are the two methods of anomaly detection mentioned in the image?

1

Header Analysis

2

Payload Analysis

3

Traffic Analysis

4

Network Analysis

45

media

46

Multiple Choice

What are the two classes that the training data is classified into using a certain method?

1

Intrusion

2

Non-intrusion

3

Malware

4

Phishing

47

media

48

Multiple Choice

What are the common techniques used in anomaly detection for network attacks?

1

Using bad checksum

2

Spoofed addresses

3

Duplicate TCP packets

4

All of the above

49

media

50

Multiple Choice

What are some leading products in the field of Intrusion Detection Systems (IDS)?

1

Dragon from Enterasys

2

CISCO Secure IDS

3

Snort

4

Wazuh

51

media

52

Multiple Choice

What are the three modes of Snort as a Network IDS?

1

Sniffer

2

Packet logger

3

Network intrusion detection

4

Firewall

53

media

54

Multiple Choice

What are the key features of Snort as mentioned in the slide?

1

Fast

2

Flexible

3

Open-source

4

All of the above

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 68

SLIDE