
IDS IPS
Authored by Norshahidayu Othman
Computers
University
Used 608+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An Intrusion Detection System (IDS) .....
can be configured to allow the intruder IP when an alert is generated
opening the network connection for an active and passive attack
inspects network activities and identifies suspicious patterns that may indicate a network attack
an identifier for the correct usage of particular computer or total network
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Looks for specific network patterns generate by known malware.
Signature based
Host intrusion detection system (HIDS)
Anomaly based
Security functionality
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Proactive monitoring of unwanted intruders e.g. firewall.
Intrusion prevention system
Fuzzing
Signature based
Network intrusion detection system (NIDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Monitors inbound and outbound traffic to identify suspicious traffic.
Network intrusion detection system (NIDS)
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion prevention system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple detection systems across a network communicating together to give a better picture of network activity.
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Firewalls, antivirus and anti spyware installed on every machine that monitors all incoming and outgoing traffic for suspicious activities
Host intrusion detection system (HIDS)
Distributed intrusion detection system (DIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Goals of IDS
Mobility and allow for a stable connection
Take action and allowing an attack to the network
Identify abnormal behaviour of network or misuse of resources
Different ways to transmit data securely and safely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?