IDS IPS

IDS IPS

Assessment

Quiz

Computers

University

Medium

Created by

Arikumar K S

Used 38+ times

FREE Resource

Student preview

quiz-placeholder

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Intrusion Detection System (IDS) .....

can be configured to allow the intruder IP when an alert is generated

opening the network connection for an active and passive attack

inspects network activities and identifies suspicious patterns that may indicate a network attack

an identifier for the correct usage of particular computer or total network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Looks for specific network patterns generate by known malware.

Signature based

Host intrusion detection system (HIDS)

Anomaly based

Security functionality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Proactive monitoring of unwanted intruders e.g. firewall.

Intrusion prevention system

Fuzzing

Signature based

Network intrusion detection system (NIDS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Monitors inbound and outbound traffic to identify suspicious traffic.

Network intrusion detection system (NIDS)

Distributed intrusion detection system (DIDS)

Host intrusion detection system (HIDS)

Intrusion prevention system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple detection systems across a network communicating together to give a better picture of network activity.

Distributed intrusion detection system (DIDS)

Host intrusion detection system (HIDS)

Intrusion detection system (IDS)

Network intrusion detection system (NIDS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, antivirus and anti spyware installed on every machine that monitors all incoming and outgoing traffic for suspicious activities

Host intrusion detection system (HIDS)

Distributed intrusion detection system (DIDS)

Intrusion detection system (IDS)

Network intrusion detection system (NIDS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Goals of IDS

Mobility and allow for a stable connection

Take action and allowing an attack to the network

Identify abnormal behaviour of network or misuse of resources

Different ways to transmit data securely and safely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?