IDS
Quiz
•
Computers
•
1st - 3rd Grade
•
Practice Problem
•
Hard
SITI SUKAIMI
Used 47+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the right definition on Intrusion Detection System.
Unauthorized access to an information system or attacks that originate outside the organization
Monitoring involves examining network traffic, activity, transactions, or behavior in order to detect security-related anomalies.
The process that identifies that the intrusion has occurred or is occurring.
The alarm or alert that provides notification that an intrusion has occurred on that computer or network.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IDS can be installed on either local hosts or networks.
TRUE
FALSE
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Continuously analyzes the behavior of processes and programs on a system and alerts the user if it detects any abnormal actions, at which point the user can decide whether to allow or block the activity."
This statement refer to:
Anomaly-based monitoring
Signature-based monitoring
Behavior-based monitoring
Heuristic monitoring
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Uses an algorithm to determine if a threat exists. It could trap an application that attempts to scan ports that the other methods may not catch."
This statement refer to:
Anomaly-based monitoring
Signature-based monitoring
Behavior-based monitoring
Heuristic monitoring
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define Protocol based intrusion detection system (PIDS).
typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system.
consists of multiple IDS over a large network, that facilitates advanced network monitoring, incident analysis, and instant attack data.
Watches for attacks on the network.
A software-based application that runs on a local host computer that can detect an attack as it occurs.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Consists of multiple IDS over a large network, that facilitates advanced network monitoring, incident analysis, and instant attack data."
This statement refer to:
Protocol based intrusion detection system (PIDS)
Distributed intrusion detection system (dIDS)
Network intrusion detection system (NIDS)
Host-based intrusion detection system (HIDS)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
HIDSs cannot integrate with existing antivirus, antispyware, and firewalls that are installed on the local host computer.
TRUE
FALSE
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Year 3 Computing Unit 1 - Computing Systems
Quiz
•
2nd Grade
11 questions
computer
Quiz
•
KG - Professional Dev...
7 questions
G2 Internet
Quiz
•
2nd Grade
15 questions
3.4 Pengalamatan IP pada jaringan komputer (KOMJARDAS)
Quiz
•
1st Grade - University
10 questions
Fundamentos de redes primer parcial.
Quiz
•
1st Grade
10 questions
Subnetting
Quiz
•
3rd Grade
10 questions
Introduction to Computer
Quiz
•
3rd - 5th Grade
15 questions
The Internet
Quiz
•
1st - 5th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
