
last22
Authored by bg bg
Computers
University
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
HIDS differs from NIDS in what manner?
One is "high" IDS and the other is "normal"
One is "host" IDS and the other is "normal"
One is "homogeneous" IDS and the other is "network"
They are the same thing
None of the above
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The biggest challenge to signature-based security for detecting malware is which of the following?
Difficulty in keeping the lists readable
Difficulty in managing more than one list
Behavioral anomalies
Variants
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a false statement regarding SIEMs?
A SIEM will not work with proper crypto
SIEM security requires network tunnels
SIEMS always require SOCs
SOCs typically use SIEMS
All the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement?
Perimeter protection works great on enterprise networks
Perimeter protection works poorly on enterprise networks
Perimeters work unless mobility is present
Cloud requires perimeter protection
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Automation in a SOC is a good idea for which of the following?
It is a mandatory requirement in most compliance frameworks
It requires 24 by 7 operation
It is already done in other parts of the enterprise
It reduces response cycle times
None of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a true statement?
IDS = IPS
SIEM = SOC
IDS is implied by IPS
SOC is implied by SIEM
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The malicious client is sending a massive flood of SYN packets to the web server. Which of the following security mitigations choices (or none) is best for the web server administrator to employ to reduce the risk of this attack:
Increased application-level authentication of the client
Running a scan on the web server for vulnerabilities
Implementing improved auditing on both the client and server
None of the above.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?