ISF QUIZ-2023-24

ISF QUIZ-2023-24

University

12 Qs

quiz-placeholder

Similar activities

KEAMANAN KOMPUTER

KEAMANAN KOMPUTER

University

15 Qs

Security Devices

Security Devices

10th Grade - University

7 Qs

Firewall & IDS

Firewall & IDS

University

10 Qs

Software Identification

Software Identification

11th Grade - University

12 Qs

Quiz on Basics of Computer Security and SSH

Quiz on Basics of Computer Security and SSH

University

12 Qs

uas-siber

uas-siber

University

10 Qs

Computer and Network Security

Computer and Network Security

University

10 Qs

CIS1103 Week 11-12 CLO 5 Security

CIS1103 Week 11-12 CLO 5 Security

University

16 Qs

ISF QUIZ-2023-24

ISF QUIZ-2023-24

Assessment

Quiz

Computers

University

Medium

Created by

Shubha V

Used 2+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A required, structured data classification scheme that rates each collection of information as well as each user.

Mandatory access controls

Discretionary access controls

Nondiscretionary controls

None of the both

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.

Authentication

Authorization

Identification

Accountability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker attempts to gain entry or disrupt normal operation.

Intrusion

authentication

identification

access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The measure of an IDPS’s ability to correctly detect and identify certain types of attacks.

Confidence value:

Threat identification
Intrusion prevention
Attack precision

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________Intrusion detection system is usually installed on a web server.

Protocol-based (PIDS)

Application protocol-based (APIDS)

Network-based intrusion detection system (NIDS)

Signature-based

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


IDS is designed to detect unknown attacks, going beyond the identification of attack signatures.

Signature-based

Anomaly-based

Host based

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____IDS collects statistical summaries by observing traffic that is known to be normal.

Behaviour-Based IDPS

knowledge-based IDPS

The stateful packet inspection approach

None

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?