
IPS / IDS
Authored by Artie Geahr
Computers
University
Used 19+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This device monitors your network for malicious traffic and responds based on rules.
IDS
ISP
IPS
Proxy
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This is the term for a switch port setting for a sniffer on and IDS/IPS.
Full Duplex
Hub Mode
Redirect mode
Promiscuous Mode
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following is an IDS capable of?
Alerting
Taking Action
Detecting
Blocking
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identifying harmless traffic as malicious is an example of:
False negative
Enticement
Entrapment
False Positive
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first goal after an attack has been detected?
Make backups of logs
Start Repairing
Start trapping the hacker to catch them
Stop the Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?