
Intrusion Detection System (IDS)
Authored by Moses Balogun
Computers
12th Grade
Used 61+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An Intrusion Detection System (IDS) .....
can be configured to allow the intruder IP when an alert is generated
opening the network connection for an active and passive attack
inspects network activities and identifies suspicious patterns that may indicate a network attack
an identifier for the correct usage of particular computer or total network
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Looks for specific network patterns generate by known malware.
Signature based
Host intrusion detection system (HIDS)
Anomaly based
Security functionality
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Proactive monitoring of unwanted intruders e.g. firewall.
Intrusion prevention system
Fuzzing
Signature based
Network intrusion detection system (NIDS)
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Monitors inbound and outbound traffic to identify suspicious traffic.
Network intrusion detection system (NIDS)
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion prevention system
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Multiple detection systems across a network communicating together to give a better picture of network activity.
Distributed intrusion detection system (DIDS)
Host intrusion detection system (HIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Firewalls, antivirus and anti spyware installed on every machine that monitors all incoming and outgoing traffic for suspicious activities
Host intrusion detection system (HIDS)
Distributed intrusion detection system (DIDS)
Intrusion detection system (IDS)
Network intrusion detection system (NIDS)
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Goals of IDS
Mobility and allow for a stable connection
Take action and allowing an attack to the network
Identify abnormal behaviour of network or misuse of resources
Different ways to transmit data securely and safely
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?