IDS IPS
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
Norshahidayu Othman
Used 608+ times
FREE Resource
Enhance your content in a minute
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An Intrusion Detection System (IDS) .....
can be configured to allow the intruder IP when an alert is generated
opening the network connection for an active and passive attack
inspects network activities and identifies suspicious patterns that may indicate a network attack
an identifier for the correct usage of particular computer or total network
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Looks for specific network patterns generate by known malware.
Signature based
Host intrusion detection system (HIDS)
Anomaly based
Security functionality
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Proactive monitoring of unwanted intruders e.g. firewall.
Intrusion prevention system
Fuzzing
Signature based
Network intrusion detection system (NIDS)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Monitors inbound and outbound traffic to identify suspicious traffic.
Network intrusion detection system (NIDS)
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion prevention system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Multiple detection systems across a network communicating together to give a better picture of network activity.
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Firewalls, antivirus and anti spyware installed on every machine that monitors all incoming and outgoing traffic for suspicious activities
Host intrusion detection system (HIDS)
Distributed intrusion detection system (DIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Goals of IDS
Mobility and allow for a stable connection
Take action and allowing an attack to the network
Identify abnormal behaviour of network or misuse of resources
Different ways to transmit data securely and safely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
L1 - Computer Networks
Quiz
•
University
20 questions
Living in the IT era QUIZ 2
Quiz
•
University
20 questions
CETA'S Quizzard
Quiz
•
University
18 questions
AI 900 - pt 1
Quiz
•
University
20 questions
NTFS
Quiz
•
University
15 questions
Menganalisis Informasi dari Internet
Quiz
•
University
15 questions
ICT Quiz
Quiz
•
University
15 questions
Firewall and Network Security
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
