
CHAPTER 4: IDS AND IPS
Authored by N M
Computers
University
Used 14+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Three aspects that are vulnerable in network system are _______. (choose 3 answers)
Network system that provide more resources.
Network systems to facilitate resource sharing.
Global protection towards user and machine.
Global protection policies.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
(a) method is typically best used for identifying known threats.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Anomaly-based Method use to detect unknown malware attacks.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
X in the diagram refers to ________.
Pattern-based
Abnormal-based
Signature-based
Detection-based
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In _______, the raw data can be compressed without loss of relevant information.
data post-processing
data patch
data classifier
data pre-processing
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
NIDS is abbreviation of (a) .
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
IPS stands for _______.
Intruder Progression System
Intrusion Post System
Intrusion Prevention System
Intruder Post System
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?