INASEC1-SecurityTechnology 2324B

INASEC1-SecurityTechnology 2324B

University

15 Qs

quiz-placeholder

Similar activities

OSI Model

OSI Model

University - Professional Development

18 Qs

Network Layer

Network Layer

University

15 Qs

Basic Network Architecture

Basic Network Architecture

12th Grade - University

10 Qs

TCP256 Finals Quiz 1

TCP256 Finals Quiz 1

University

20 Qs

Principles of Information Technology

Principles of Information Technology

9th Grade - University

16 Qs

Cyber Security - 01

Cyber Security - 01

University

10 Qs

Computer Security Chapter 7: Creating a Security Plan

Computer Security Chapter 7: Creating a Security Plan

University

15 Qs

MidTerm Trivia - Module 5-6

MidTerm Trivia - Module 5-6

University

10 Qs

INASEC1-SecurityTechnology 2324B

INASEC1-SecurityTechnology 2324B

Assessment

Quiz

Computers

University

Easy

Created by

Lorie Narag

Used 10+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

1. Intrusion detection systems (IDSs) detect potential intrusions and sound an alarm.

True

False

2.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

2. The more recently developed intrusion prevention systems (IPSs) also detect intrusions and can also take action to defend the network.

True

False

3.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

3. An intrusion detection and prevention system (IDPS) works like a burglar alarm by detecting network traffic that is a violation of the rules with which it is configured (corresponding to an opened or broken window) and activates an alarm.

True

False

4.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

4. A network-based IDPS (NIDPS) monitors network traffic, and when a predefined event occurs, it responds and notifies the appropriate administrator

False

True

5.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

5. A host-based IDPS (HIDPS) resides on a particular computer or server and monitors activity on that system.

True

False

6.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

6. Signature-based IDPSs, also known as knowledge-based IDPSs, examine data traffic for patterns that match signatures, which are preconfigured, predetermined attack patterns.

False

True

7.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

7. Statistical anomaly-based IDPSs, also known as behavior-based IDPSs, collect data from normal traffic and establish a baseline.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?