Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)



1

In intrusion detection systems (IDSs), a decision tree helps the ____ component to examine traffic patterns.
A)analysis engine
B)signature database
C)traffic collector
D)user interface and reporting
2

In an IDS, the ____ component is a collection of patterns and definitions of known suspicious or malicious activity.
A)analysis engine
B)signature database
C)traffic collector
D)user interface and reporting
3

In an IDS, the ____ component examines and compares the collected network traffic to known patterns of suspicious or malicious activity.
A)analysis engine
B)signature database
C)traffic collector
D)user interface and reporting
4

The component that acts as a sniffer in a network-based IDS is the ____.
A)analysis engine
B)signature database
C)traffic collector
D)user interface and reporting
5

The activity pattern that matches a context-based signature pattern is ____.
A)a potential intruder scanning for open Web servers on a specific network
B)a TCP packet in which the synchronize, reset, and urgent flags are all set
C)the characters “to: decode” in the header of an e-mail message
D)the characters “/etc/passwd” in a telnet session
6

The type of activity pattern that matches a content-based signature pattern is ____.
A)a potential intruder scanning for open Web servers on a specific network
B)a ping flood attack identification
C)a Nessus scan system examination
D)the characters “/etc/passwd” in a telnet session
7

In a network-based IDS, the ____ component is NOT a part of the sensor entity.
A)analysis engine
B)signature database
C)traffic collection
D)user interface and reporting
8

Binary trees have elements that contain a maximum of ____ sub-elements.
A)two
B)four
C)six
D)eight
9

Which of the following components in a network-based IDS is designed to extract network traffic?
A)Analysis engine
B)Signature database
C)Traffic collector
D)User interface and reporting
10

A hostile activity that does not match an IDS signature and is undetected is an example of a ____.
A)false negative
B)false positive
C)buffer overflow
D)privilege error







Security+ and BeyondOnline Learning Center

Home > Chapter 13 > Multiple Choice Quiz