IDS
Quiz
•
Computers
•
1st - 3rd Grade
•
Practice Problem
•
Hard
SITI SUKAIMI
Used 47+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the right definition on Intrusion Detection System.
Unauthorized access to an information system or attacks that originate outside the organization
Monitoring involves examining network traffic, activity, transactions, or behavior in order to detect security-related anomalies.
The process that identifies that the intrusion has occurred or is occurring.
The alarm or alert that provides notification that an intrusion has occurred on that computer or network.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IDS can be installed on either local hosts or networks.
TRUE
FALSE
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Continuously analyzes the behavior of processes and programs on a system and alerts the user if it detects any abnormal actions, at which point the user can decide whether to allow or block the activity."
This statement refer to:
Anomaly-based monitoring
Signature-based monitoring
Behavior-based monitoring
Heuristic monitoring
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Uses an algorithm to determine if a threat exists. It could trap an application that attempts to scan ports that the other methods may not catch."
This statement refer to:
Anomaly-based monitoring
Signature-based monitoring
Behavior-based monitoring
Heuristic monitoring
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define Protocol based intrusion detection system (PIDS).
typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system.
consists of multiple IDS over a large network, that facilitates advanced network monitoring, incident analysis, and instant attack data.
Watches for attacks on the network.
A software-based application that runs on a local host computer that can detect an attack as it occurs.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
"Consists of multiple IDS over a large network, that facilitates advanced network monitoring, incident analysis, and instant attack data."
This statement refer to:
Protocol based intrusion detection system (PIDS)
Distributed intrusion detection system (dIDS)
Network intrusion detection system (NIDS)
Host-based intrusion detection system (HIDS)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
HIDSs cannot integrate with existing antivirus, antispyware, and firewalls that are installed on the local host computer.
TRUE
FALSE
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Year 3 Computing Unit 1 - Computing Systems
Quiz
•
2nd Grade
11 questions
computer
Quiz
•
KG - Professional Dev...
7 questions
G2 Internet
Quiz
•
2nd Grade
10 questions
Pre-test | Empowerment Technologies
Quiz
•
1st - 5th Grade
15 questions
3.4 Pengalamatan IP pada jaringan komputer (KOMJARDAS)
Quiz
•
1st Grade - University
10 questions
Fundamentos de redes primer parcial.
Quiz
•
1st Grade
10 questions
Introduction to Computer
Quiz
•
3rd - 5th Grade
15 questions
The Internet
Quiz
•
1st - 5th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
