ISF QUIZ-2023-24

ISF QUIZ-2023-24

University

12 Qs

quiz-placeholder

Similar activities

BASIC HTML

BASIC HTML

University

9 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

ITE-1-Ch01-Quiz1

ITE-1-Ch01-Quiz1

University

10 Qs

Information System and Modern Organization part 1

Information System and Modern Organization part 1

University

14 Qs

Computer Applications in Banking and Finance Quiz

Computer Applications in Banking and Finance Quiz

University

15 Qs

U26 Q7 - CIDR

U26 Q7 - CIDR

KG - University

12 Qs

E-COMMERCE - CHAPTER 3

E-COMMERCE - CHAPTER 3

University

15 Qs

Quiz #2 ETEC 486 | Spr. 16

Quiz #2 ETEC 486 | Spr. 16

KG - University

10 Qs

ISF QUIZ-2023-24

ISF QUIZ-2023-24

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Shubha V

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A required, structured data classification scheme that rates each collection of information as well as each user.

Mandatory access controls

Discretionary access controls

Nondiscretionary controls

None of the both

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels.

Authentication

Authorization

Identification

Accountability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Attacker attempts to gain entry or disrupt normal operation.

Intrusion

authentication

identification

access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The measure of an IDPS’s ability to correctly detect and identify certain types of attacks.

Confidence value:

Threat identification
Intrusion prevention
Attack precision

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________Intrusion detection system is usually installed on a web server.

Protocol-based (PIDS)

Application protocol-based (APIDS)

Network-based intrusion detection system (NIDS)

Signature-based

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


IDS is designed to detect unknown attacks, going beyond the identification of attack signatures.

Signature-based

Anomaly-based

Host based

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____IDS collects statistical summaries by observing traffic that is known to be normal.

Behaviour-Based IDPS

knowledge-based IDPS

The stateful packet inspection approach

None

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?