Search Header Logo

Lecture 12 Intrusion Detection Systems

Authored by Alejandro Gomez

Computers

Used 5+ times

Lecture 12 Intrusion Detection Systems
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is an NIDS?

A software to detect inappropriate or malicious activity on a computer netork

A software that has package payload analysis capabilities

A software that has alerting capabilities whenever a malicious package is identified

All answers are correct

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which kind of IDS systems exist?

Host-based IDS

Printer-based IDS

Network-based IDS

All answers are correct

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following are NOT components of an IDS system?

Traffic collector

Indicator of compromise (IOCs) database

Analysis engine

User interface and reporting

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which four detection models exists for IDS systems?

Behaviour based, signature based, cognitive based, temporary based

Behaviour based, signature based, Anomaly based, artificial intelligence based

Behaviour based, signature based, Anomaly based, Heuristic based

Behaviour based, last access based, Anomaly based, derivative based

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What's the main drawback of placing an NIDS behind the firewall?

You will reduce the number of alarms

You will see all traffic passed from the FW into the network

You won't see attacks until they have breached the firewall

All of them are drawbacks

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which are the two more popular open source NIDS tools?

Falcon

Snort

Suricata

Tetragon

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a key difference between an NIPS and a NIDS?

NIPS have an internal signature database

NIPS can't analyze encrypted traffic

NIPS must sit inline with the traffic

NIPS can use both anomaly based and signature based detections.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?