last22
Quiz
•
Computers
•
University
•
Practice Problem
•
Easy
bg bg
Used 9+ times
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
HIDS differs from NIDS in what manner?
One is "high" IDS and the other is "normal"
One is "host" IDS and the other is "normal"
One is "homogeneous" IDS and the other is "network"
They are the same thing
None of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The biggest challenge to signature-based security for detecting malware is which of the following?
Difficulty in keeping the lists readable
Difficulty in managing more than one list
Behavioral anomalies
Variants
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a false statement regarding SIEMs?
A SIEM will not work with proper crypto
SIEM security requires network tunnels
SIEMS always require SOCs
SOCs typically use SIEMS
All the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement?
Perimeter protection works great on enterprise networks
Perimeter protection works poorly on enterprise networks
Perimeters work unless mobility is present
Cloud requires perimeter protection
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Automation in a SOC is a good idea for which of the following?
It is a mandatory requirement in most compliance frameworks
It requires 24 by 7 operation
It is already done in other parts of the enterprise
It reduces response cycle times
None of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement?
IDS = IPS
SIEM = SOC
IDS is implied by IPS
SOC is implied by SIEM
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The malicious client is sending a massive flood of SYN packets to the web server. Which of the following security mitigations choices (or none) is best for the web server administrator to employ to reduce the risk of this attack:
Increased application-level authentication of the client
Running a scan on the web server for vulnerabilities
Implementing improved auditing on both the client and server
None of the above.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Next Generation Technology Quiz
Quiz
•
University
20 questions
Introduction To Computers
Quiz
•
University
20 questions
PRINTERS
Quiz
•
University
20 questions
Designing Network Infrastructure and Network Security
Quiz
•
KG - University
18 questions
Memory-Mobo-Hard/Software
Quiz
•
University
20 questions
Google SketchUp Tool
Quiz
•
KG - University
20 questions
Teknologi WAN XI TKJ
Quiz
•
University
20 questions
Basic of Computer Networks - Quiz1
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
