IDS IPS

IDS IPS

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Arikumar K S

Used 39+ times

FREE Resource

Student preview

quiz-placeholder

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An Intrusion Detection System (IDS) .....

can be configured to allow the intruder IP when an alert is generated

opening the network connection for an active and passive attack

inspects network activities and identifies suspicious patterns that may indicate a network attack

an identifier for the correct usage of particular computer or total network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Looks for specific network patterns generate by known malware.

Signature based

Host intrusion detection system (HIDS)

Anomaly based

Security functionality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Proactive monitoring of unwanted intruders e.g. firewall.

Intrusion prevention system

Fuzzing

Signature based

Network intrusion detection system (NIDS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Monitors inbound and outbound traffic to identify suspicious traffic.

Network intrusion detection system (NIDS)

Distributed intrusion detection system (DIDS)

Host intrusion detection system (HIDS)

Intrusion prevention system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Multiple detection systems across a network communicating together to give a better picture of network activity.

Distributed intrusion detection system (DIDS)

Host intrusion detection system (HIDS)

Intrusion detection system (IDS)

Network intrusion detection system (NIDS)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls, antivirus and anti spyware installed on every machine that monitors all incoming and outgoing traffic for suspicious activities

Host intrusion detection system (HIDS)

Distributed intrusion detection system (DIDS)

Intrusion detection system (IDS)

Network intrusion detection system (NIDS)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Goals of IDS

Mobility and allow for a stable connection

Take action and allowing an attack to the network

Identify abnormal behaviour of network or misuse of resources

Different ways to transmit data securely and safely

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers