

Untitled Presentation
Presentation
•
Computers
•
University
•
Practice Problem
•
Hard
abdul hadi
FREE Resource
39 Slides • 29 Questions
1
2
Multiple Choice
Which type of IDS system uses a predetermined set of rules or signatures to detect known malicious activity?
Anomaly-based system
Protocol-based system
Signature-based system
Behavior-based system
3
4
5
Multiple Choice
What triggers an alert in a SIEM system?
All data received
Data matching a known virus signature
Data exceeding an established threshold
Unauthorized access attempts
6
7
Multiple Choice
What is the purpose of NIPS/NIDS in network monitoring?
To monitor asset conditions
To detect and prevent network intrusions
To manage network performance
To analyze network traffic
8
9
Multiple Choice
What are the classifications of intrusion mentioned in the text?
Attempted Break-ins
Masquerade attacks
Denial of Service
Malicious Use
10
11
Multiple Choice
How does an Intrusion Detection System (IDS) differ from an Intrusion Prevention System (IPS)?
An IDS detects and alerts on potential intrusions, while an IPS can actively block or prevent them.
An IDS operates on the network layer, while an IPS operates on the application layer.
An IDS is used for physical security breaches, while an IPS is used for digital security breaches.
There is no difference; IDS and IPS are interchangeable terms.
12
13
Multiple Choice
What is a firewall and how does it enhance security?
A firewall enhances security by encrypting all network traffic.
A firewall enhances security by slowing down network performance.
A firewall enhances security by monitoring and controlling network traffic based on security rules, acting as a barrier between trusted and untrusted networks.
A firewall enhances security by allowing all network traffic without any restrictions.
14
15
Multiple Choice
A(n) ______________ _____________ ____________ detects anomalies with the aim of
catching hackers before they do real damage to a network.
16
17
Multiple Choice
What are the limitations of a firewall compared to an IDS?
Firewalls can detect all security breaches
Firewalls inspect all traffic content
Firewalls are less likely to be attacked than IDS
Firewalls cannot detect security breaches associated with traffic that does not pass through it
18
19
Multiple Choice
What is the primary goal of intrusion detection systems (IDS)?
To block all network traffic
To inspect all network activity and identify suspicious patterns
To monitor only outbound traffic
To prevent all system attacks
20
21
Multiple Choice
What are the main functions of an Intrusion Detection System as depicted in the diagram?
Monitor
Respond
Report
Analyze
22
23
Multiple Select
What are the two main functions of an Intrusion Detection System (IDS) as described in the text?
Monitor
Report
Analyze
Detect
24
25
Multiple Choice
What is the purpose of ID in reducing security risks?
To initiate mitigation activities
To provide risk-related information
To deal with incidents
To monitor security risks
26
27
Multiple Choice
What are the two approaches to Intrusion Detection mentioned in the image?
Preemptory
Reactionary
Proactive
Passive
28
29
Multiple Choice
What are the main functions of a Network-Based Intrusion Detection System (IDS)?
Monitoring network activity
Capturing packet headers
Comparing patterns with threats
Sending email notifications
30
31
Multiple Choice
What are the tools used in Host-based IDS?
Swatch
Log check
Mod_security
Tripwire
32
33
Multiple Choice
What is the difference between Rule Based / Misuse detection and Anomaly detection in network security?
Rule Based detection is faster
Anomaly detection can identify new attacks
Rule Based detection requires less data
Anomaly detection is less accurate
34
Multiple Choice
Which IDS method searches for intrusion or attack attempts by recognizing patterns or identifying entities listed in a database?
Anomaly-analysis-based IDS
Heuristics-based IDS
Stateful-inspection-based IDS
Signature-based IDS
35
Multiple Choice
What is the MOST common form of host-based IDS that employs signature or pattern-matching detection methods?
Anti-Virus
software
Motion Detectors
Firewall
Honeypots
36
Multiple Choice
____________ is an unusual activity in a group of otherwise normal activities.
Anomaly
Iteration
Parameter
Precision
37
38
Multiple Choice
What are the two types of response mentioned in the image?
Active
Passive
Reactive
Proactive
39
40
Multiple Choice
What is a threshold in the context of normal activity?
A value that represents the boundary of normal activity
A maximum number of attempts allowed
A type of network activity
A measure of file I/O activity
41
42
Multiple Choice
What does the rule "Alert tcp any any -> 192.168.1.0/24 111" specify in terms of packet examination?
It specifies the action to take
It specifies the destination IP
It specifies the protocol
It specifies the source IP
43
44
Multiple Choice
What are the two methods of anomaly detection mentioned in the image?
Header Analysis
Payload Analysis
Traffic Analysis
Network Analysis
45
46
Multiple Choice
What are the two classes that the training data is classified into using a certain method?
Intrusion
Non-intrusion
Malware
Phishing
47
48
Multiple Choice
What are the common techniques used in anomaly detection for network attacks?
Using bad checksum
Spoofed addresses
Duplicate TCP packets
All of the above
49
50
Multiple Choice
What are some leading products in the field of Intrusion Detection Systems (IDS)?
Dragon from Enterasys
CISCO Secure IDS
Snort
Wazuh
51
52
Multiple Choice
What are the three modes of Snort as a Network IDS?
Sniffer
Packet logger
Network intrusion detection
Firewall
53
54
Multiple Choice
What are the key features of Snort as mentioned in the slide?
Fast
Flexible
Open-source
All of the above
55
56
57
58
59
60
61
62
63
64
65
66
67
68
Poll
How confident do you feel about this topic now?
Show answer
Auto Play
Slide 1 / 68
SLIDE
Similar Resources on Wayground
62 questions
Y12 EC Data Science Wk3 Lesson
Presentation
•
12th Grade
65 questions
Security Basics
Presentation
•
12th Grade
62 questions
REVISION ( JUNE 19 TO 22 )
Presentation
•
KG
65 questions
U16-KLO1.1-2.1-2.2-2.3
Presentation
•
KG - University
66 questions
W7 -Subnetting IP Networks (SY25-26 / C305-304I)305-304I)
Presentation
•
University
64 questions
JARKOM3
Presentation
•
University
61 questions
Federal Spending
Presentation
•
11th - 12th Grade
63 questions
นวัตกรรมและเทคโนโลยีสมัยใหม่ ม.6
Presentation
•
12th Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade
Discover more resources for Computers
55 questions
Post Malone Addtion (Tres)
Quiz
•
12th Grade - University
20 questions
Disney Trivia
Quiz
•
University
50 questions
AP Biology Exam Review 2017
Quiz
•
11th Grade - University
24 questions
5th Grade Math EOG Review
Quiz
•
KG - University
12 questions
Star Wars Trivia - Easy
Quiz
•
KG - University
215 questions
8th Physical Science GA Milestones Review
Quiz
•
KG - University
40 questions
Famous Logos
Quiz
•
7th Grade - University
14 questions
(5-3) 710 Mean, Median, Mode & Range Quick Check
Quiz
•
6th Grade - University