IDS IPS
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
Norshahidayu Othman
Used 608+ times
FREE Resource
Enhance your content in a minute
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An Intrusion Detection System (IDS) .....
can be configured to allow the intruder IP when an alert is generated
opening the network connection for an active and passive attack
inspects network activities and identifies suspicious patterns that may indicate a network attack
an identifier for the correct usage of particular computer or total network
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Looks for specific network patterns generate by known malware.
Signature based
Host intrusion detection system (HIDS)
Anomaly based
Security functionality
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Proactive monitoring of unwanted intruders e.g. firewall.
Intrusion prevention system
Fuzzing
Signature based
Network intrusion detection system (NIDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Monitors inbound and outbound traffic to identify suspicious traffic.
Network intrusion detection system (NIDS)
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion prevention system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple detection systems across a network communicating together to give a better picture of network activity.
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Firewalls, antivirus and anti spyware installed on every machine that monitors all incoming and outgoing traffic for suspicious activities
Host intrusion detection system (HIDS)
Distributed intrusion detection system (DIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Goals of IDS
Mobility and allow for a stable connection
Take action and allowing an attack to the network
Identify abnormal behaviour of network or misuse of resources
Different ways to transmit data securely and safely
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
E-commerce Chapter 1
Quiz
•
University
15 questions
ICT 0513 - Chapter 4 : System Unit
Quiz
•
University
13 questions
CSC 2663 - Database administrative Functions
Quiz
•
University
20 questions
ADMINISTRASI SISTEM JARINGAN
Quiz
•
University
16 questions
Computer Security Risk
Quiz
•
11th Grade - University
20 questions
Quiz Inf X.B
Quiz
•
10th Grade - University
16 questions
SecOps Quiz
Quiz
•
University
15 questions
untitled
Quiz
•
11th Grade - University
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
Discover more resources for Computers
10 questions
Identifying equations
Quiz
•
KG - University
7 questions
Different Types of Energy
Interactive video
•
4th Grade - University
20 questions
HS2C2 AB QUIZIZZ
Quiz
•
1st Grade - Professio...
14 questions
Homonyms Quiz
Quiz
•
KG - University
16 questions
Parts of a Parabola
Quiz
•
8th Grade - University
10 questions
A Brief History of Geologic Time
Interactive video
•
11th Grade - University
15 questions
Black Friday/Cyber Monday
Quiz
•
9th Grade - University
7 questions
Biomolecules (Updated)
Interactive video
•
11th Grade - University
