Follow and like us on our Facebook page where we post on the new release subject and answering tips and tricks to help save your time so that you can never feel stuck again.
Shortcut

Ctrl + F is the shortcut in your browser or operating system that allows you to find words or questions quickly.

Ctrl + Tab to move to the next tab to the right and Ctrl + Shift + Tab to move to the next tab to the left.

On a phone or tablet, tap the menu icon in the upper-right corner of the window; Select "Find in Page" to search a question.

Share Us

Sharing is Caring

It's the biggest motivation to help us to make the site better by sharing this to your friends or classmates.

Intrusion Detection System

A security tool that monitors network or system activities, identifying and alerting on potential unauthorized access or malicious activities.

intrusion detection system

ids

security

network

alerts

anomalies

monitoring

attacks

cybersecurity

sensors

traffic

analysis

intrusions

detection

response

A notification device that uses a clapper to strike a gong is a

  • bell

Uses fuzzy set theory where reasoning is approximate, and can accommodate uncertainty.

  • Fuzzy Logic

Open source, highly configurable and portable host-based or network-based IDS. Often referred to as a lightweight IDS

  • SNORT

What does the term "false positive" mean in the context of IDS?

  • An alert generated by the IDS for normal network activity
  • An alert generated by the IDS for a confirmed intrusion
  • An alert generated by the IDS for a known threat
  • An alert generated by the IDS for a false alarm

Which of the following is an example of a well-known NIDS tool?

  • Snort
  • Wireshark
  • SELinux
  • Nmap

Which of the following is TRUE regarding Enterprise Theory of Investigation (ETI)?

  • It adopts an approach toward criminal activity as a criminal act.
  • It adopts a holistic approach toward any criminal activity as a criminal operation rather than as a single criminal activity.
  • It differs from traditional investigative methods and is less complex and less time- consuming.
  • It encourages reactive action on the structure of the criminal enterprise.

inserted into a network segment so that the traffic it is monitoring must pass through the sensors. Commonly done by combining a NIDS sensors with something traffic already flows through, like a firewall or switch. It can be a standalone device though. The goal of these is to block an attack when one is detected.

  • Inline Sensors

Minimal technical skill who primarily use existing attack toolkits. Likely comprise the largest number of attackers, including many criminal and activist hackers. "script-kiddies"

  • Apprentice

Involves the use of rules for identifying known penetrations or penetrations that would exploit known weaknesses. Rules can also be defined that identify suspicious behavior, even when the behavior is within the bounds of established patterns of usage. Typically the rules are specific to the machine/OS.

  • Rule-based heuristic identification

Uses techniques inspired by evolutionary biology, including inheritance, mutation, selection and recombination, to develop classification rules.

  • Genetic Algorithms

Actions such as the installation of backdoors or other malicious software, or through the addition of covert authentication credentials or other configuration changes to the system, to enable continued access by the attacker after the initial attack.

  • Maintaining Access

T/F A Network IDS can protect system specific files

  • F (cannot)

Which of the following is NOT an element of cybercrime?

  • Fast-paced speed
  • Smaller evidence in size
  • Anonymity through masquerading
  • Volatile evidence

The raw data that an IDS uses to detect unauthorized/undesired activity. Things like network packets, OS audit logs, application audit logs, and system-generated checksum data.

  • Data Sources

Which of the following is TRUE regarding computer forensics?

  • Computer forensics deals with the monetary cost of finding evidence related to a crime to find the culprits and initiate legal action against them.
  • Computer forensics deals with the search for evidence related to a digital crime, but the forensics specialist does not need to be concerned about the legal admissibility of the evidence he or she finds.
  • Computer forensics deals with the process of finding evidence related to a digital crime to find the culprits and initiate legal action against them.
  • Computer forensics deals only with the process of finding evidence related to a digital crime and does not try to estimate the monetary damages caused by that crime.

Receives reports from LAN monitor and host agents and processes and correlates these reports to detect intrusion.

  • Central manager module

Describes a data model to represent information exported by intrusion detection systems and explains the rationale for using this model. An implementation of the data model in the Extensive Markup Language (XML) is presented, an XML document type definition is developed, and examples are provided.

  • Intrusion Detection Message Exchange Format

On Macintosh computers, which architecture utilizes EFI to initialize the hardware interfaces after the BootROM performs POST?

  • PowerPC
  • Intel
  • SPARC
  • ARM

Which of the following Federal Rules of Evidence contains Rulings on Evidence?

  • Rule 105
  • Rule 101
  • Rule 102
  • Rule 103

Distributed IDS developed by Intel. Has each host and each network device considered to be a potential sensor that you can install the sensor software module on. The sensors in this distributed configuration can exchange information to corroborate the state of the network.

  • Autonomic Enterprise Security

When a network based IDS is established, its interface is placed in _________ mode

  • promiscuous

Which of the following is NOT a type of flash-based memory?

  • Double-level cell (DLC)
  • Single-level cell (SLC)
  • Multi-level cell (MLC)
  • Triple-level cell (TLC)

MBR almost always refers to the partition sector of a disk also known as:

  • Primary Boot Record (PBR)
  • 512-byte boot sector
  • 256-byte boot sector
  • First Boot Record (FBR)

In an advanced IDS system, one could redirect traffic to a _______ and analyze the pattern of attack

  • Honeypot

Bayesian networks, Markov models, Neural networks, fuzzy logic, genetic algorithms, clustering and outlier detection

  • Examples of machine-learning approaches

Responsible for collecting data. The input may be any part of a system that could contain evidence of an intrusion. Types of input to these includes network packets, log files, and system call traces.

  • Sensors

When mirroring a port for a network IDS, you should mirror to the ________ router or ______

  • boundary, firewall

What is the meaning of the acronym POST?

  • Power-on self-test
  • Power-off system-test
  • Power-on system-test
  • Power-off self-test

What is the purpose of the "correlation" phase in the operation of an IDS?

  • To generate alerts
  • To analyze data from multiple sources and determine if an intrusion has occurred
  • To collect and store event data
  • To record information about events for analysis and reporting

What does the term "payload" refer to in the context of network traffic?

  • To monitor network traffic for suspicious activities
  • To generate alerts for suspicious activities
  • The actual data or information being transmitted in the network
  • To analyze behavior patterns across the entire network

What is the primary goal of a denial-of-service (DoS) attack?

  • To analyze network traffic
  • To overwhelm a system or network, making it unavailable to users
  • To generate alerts for suspicious activities
  • To slow down network traffic

Data sources, sensor, analyzer, administrator, manager, operator

  • Components of the model on which the intrusion detection messsage exchange is based

Packet Decoder, Detection Engine, Logger, Alerter

  • Four Logical Components of SNORT

The agent captures each audit record produced by the native audit collection system. A filter is applied that retains only those records that are of security interest. These records are then reformatted into a standardized format

  • Host Audit Record (HARD)

T/F A network IDS can determine if an attack will succeed or fail.

  • F (can generate lots of irrelevant alerts)

Which of the following should be considered before planning and evaluating the budget for the forensic investigation case?

  • Breakdown of costs into daily and annual expenditure
  • Current media coverage of high-profile computer crimes
  • Past success rate as a measure of value
  • Use of outdated, but trusted, technologies

Which of the following is a potential limitation of using MAC filtering in network security?

  • MAC addresses can be spoofed or changed by attackers
  • It is resource-intensive and slows down network performance
  • It generates too many false positives
  • It is difficult to configure and maintain

A ____ based IDS is limited to a single system, and verify what HAS happened rather than what MIGHT have happened

  • Host

This document defines requirements for the Intrusion Detection Message Exchange Format (IDMEF) and the requirements for a communication protocol for communicating IDMEF.

  • Intrusion Detection Message Exchange Requirements

Which of the following is true with regard to magnetic switch sensor installation?

  • mounted door on ill fitting door may lead to premature failure of the sensor

Group the observed data into clusters based on some similarity or distance measure, and then identify subsequent data as either belonging to a cluster or as an outlier.

  • Clustering and outlier detection

T/F A Tap that copies traffic crossing it is a two way connection

  • F (One way only)

ID component or process that analyzes the data collected by the sensor for signs of unauthorized/undesired activity or for events that may be of interest to the security admin. Sometimes the sensor/analyzer can be part of the same component.

  • Analyzer (DMX)

The means by which programs access core kernel functions, providing a wide range of interactions with the low-level operating systems functions.

  • Systems Calls

Which cmdlet can investigators use in Windows PowerShell to parse GPTs of both types of hard disks, including the ones formatted with either UEFI or MBR?

  • Get-GPT
  • Get-MBR
  • Get-BootSector
  • Get-PartitionTable

Which of the following basic partitioning tools displays details about GPT partition tables in Windows OS?

  • DiskPart
  • Gparted
  • Disk Utility
  • Fdisk

Monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.

  • Network-based IDS

What does the term "false negative" mean in the context of IDS?

  • An alert generated by the IDS for normal network activity
  • An alert generated by the IDS for a confirmed intrusion
  • A failure of the IDS to detect a real intrusion
  • An alert generated by the IDS for a false alarm

Combines information from a number of sensors, other both host and network-based, in a central analyzer that is able to better identify and respond to the intrusion activity.

  • Distributed/Hybrid IDS

Which of the following describes when a user plugs in a computer and starts it from a fully off condition?

  • Warm booting
  • Soft booting
  • Hot booting
  • Cold booting

A ______ based IDS monitors all traffic moving across a segment

  • Network

Anomaly Detection, Signature/Heuristic Detection

  • Analysis Approaches

alerts that are generated when the gossip traffic enables a platform to conclude that an attack is underway.

  • DDI Events

In ______ Net IDS screening, the IDS is installed in-line with the traffic flow so all traffic must pass through the IDS system.

  • Active

Which of these is a major requirement of an outdoor microwave installation?

  • prevent undesirable spread of a microwave beams

Data is transmitted from the keypad to a decoder through twisted pair or shielded twisted pair cable in a(n)

  • serial data

The human with overall responsibility for setting the security policy of the organization, and thus, for decisions about deploying and configuring the IDS.

  • Administrator

Leakage current is drained by the intrusion control

  • grounding system

What is the primary advantage of behavior-based IDS?

  • It can detect previously unknown threats and zero-day attacks.
  • It is easy to configure and maintain.
  • It has a low rate of false positives.
  • It relies on known patterns or signatures.

What is the main difference between Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)?

  • IDS only detect and alert, while IPS can detect and actively block intrusions.
  • IPS only detect and alert, while IDS can detect and actively block intrusions.
  • IDS only detect and alert, while IPS cannot block intrusions.
  • IPS only detect and alert, while IDS cannot block intrusions.

Actions taken on the system, typically via a local access vulnerability, to increase the privileges available to the attacker to enable their desired goals on the target system.

  • Privilege Escalation

Apprentice, Journeyman, Master

  • Skill Levels of Hackers/Crackesr

Which position does the protective MBR occupy in the GPT at Logical Block Address 0?

  • Second
  • First
  • Last
  • Third

NIDs typically analyze IPv4, IPv6, ICMP, and IGMP at this level. Examples of attacks are spoofed IP addresses and illegal IP header values.

  • Network Layer reconnaissance and attacks

Which LBA will be the first usable sector?

  • LBA 36
  • LBA 33
  • LBA 35
  • LBA 34

What is the last addressable block where negative addressing of the logical blocks starts from the end of the volume in GPT?

  • -255
  • -1
  • 0
  • 255

What is the primary goal of an IDS evasion technique?

  • To make the IDS generate fewer false positives
  • To make the IDS generate more alerts
  • To bypass or avoid detection by the IDS
  • To slow down network traffic

Reside on trusted, self-defending platforms and intelligent IDSs. These systems correlate distributed information, local decisions, and individual device actions to detect intrusions that may not be evident at the host level.

  • PEP Events

T/F IDSs don't have false positives or negatives

  • F (Susceptible to the same problem as a regular security system)

Decoy systems that are designed to lure a potential attacker away from critical systems. designed to:Divert an attacker from accessing critical systems.Collect information about the attacker's activity.Encourage the attacker to stay on the system long enough for administrators to respond.

  • Honeypot

Events from various sources are collected by intermediate collection points such as firewalls, IDSs, or servers that serve a specific segment of a network. These events are summarized for delivery to the central policy system.

  • Summary Events

Because they use a lot of Dynamic Link Libraries (DLL) as an intermediary between process requests and the system call interface.

  • Why don't Windows systems use anomaly based HIDS?

Which of the following is unique to SSDs?

  • Spindle
  • NAND chips
  • Read/write heads
  • Platters

Software that exists that can import and analyze data from a variety of sources, sensors, and products. May rely on standardized protocols.

  • Security information and event management (SIEM)

Which of the following is NOT a common type of denial-of-service (DoS) attack?

  • Phishing
  • Distributed Denial of Service (DDoS)
  • Smurf Attack
  • SYN Flood

Building control circuits that are powered and controlled by a fire alarm system are governed by

  • NEC 760

Which Windows operating system powers on and starts up using either the traditional BIOS-MBR method or the newer UEFI-GPT method?

  • Windows 10
  • Windows 7
  • Windows Vista
  • Windows XP

Which of the following is TRUE of civil crimes?

  • The initial reporting of the evidence is generally informal.
  • Law enforcement agencies are responsible for collecting and analyzing evidence.
  • The standards of proof need to be very high.
  • A formal investigation report is required.

Which of the following is an advantage of using a host-based IDS (HIDS)?

  • It can monitor network traffic for suspicious activities.
  • It can provide detailed information about activities on a specific host.
  • It can detect network-based attacks.
  • It can analyze behavior patterns across the entire network.

Which LBA stores the protective MBR?

  • LBA 2
  • LBA 3
  • LBA 0
  • LBA 1

Which of the following statements is correct with regard to piezoelectric sensor installation?

  • the detector is mounted 6 to 8 feet from floor

Situation where an intruder is not identified as an intruder.

  • False Negative

What is the primary purpose of a honeypot in network security?

  • To attract and study malicious activity
  • to improve security measures
  • To encrypt network traffic
  • To generate alerts for suspicious activities
  • To slow down network traffic

T/F A host based IDS can limit outgoing traffic if a system is compromised.

  • T

Low Interaction or High Interaction

  • Honeypots Classified As Either

Is a real system, with a full OS, services and applications, which are instrumented and deployed where they can be accessed by attackers.

  • High Interaction Honeypot

Which of the following is NOT a consideration during a cybercrime investigation?

  • Presentation of admissible evidence
  • Value or cost to the victim
  • Collection of clues and forensic evidence
  • Analysis of digital evidence

T/F A strength of host based IDSs is that they reduce false positives

  • T

Signature and Anomaly

  • NIDS detection techniques

A common approach to detecting intruder activity on a system is to periodically scan critical files for changes from the desired baseline, by comparing a current cryptographic checksums for these files, with a record of known good values. Disadvantages include the needed to generate and protect the checksums using known good files, and the difficulty monitoring changing files. Tripwire is an example.

  • File integrity checksums

Hackers with motivations other than those listed above, including classic hackers/crackers motivated by technical challenge or peer-group esteem and reputation. "Hobby hackers"

  • Others

Either individuals or members of an organized crime group with a goal of financial award. To achieve this, their activities may include identity theft, theft of financial credentials, corporate espionage, data theft, or data ransoming. Meet in underground forums to coordinate attacks.

  • Cyber Criminals

Designed to aid countering threats, specifically against known, less-sophisticated attacks by activist groups, large email scams, etc.

  • Intrusion Detection Systems (IDS) and intrusion prevention systems (IPS)

Network IDSs are best deployed in places that they can see _____ of interest

  • traffic

What is the primary purpose of an anomaly-based IDS?

  • To detect deviations from normal behavior and flag potential intrusions
  • To detect known patterns or signatures of known threats
  • To analyze network traffic for known vulnerabilities
  • To encrypt network traffic

What is the role of the analyzer component in an IDS?

  • To collect and store event data
  • To generate alerts based on collected data
  • To analyze network traffic for anomalies
  • To correlate data and determine if an intrusion has occurred

Situation where an authorized user is identified as an intruder.

  • False Positive

Which of the following is NOT used in the calculation of HDD density?

  • Area density
  • Bit density
  • Block density
  • Track density

In a wet or corrosive environment, and exterior wall and any security systems equipment must be separated by at least

  • 1/4 inch

An approach used on Windows systems is used to monitor access to the registry, given the amount of information and access to it used by programs on these systems.

  • Registry Access

IDS systems in the late 1980s used automated ___ _______

  • log parsers

What is heuristic-based detection in an IDS?

  • To detect known patterns or signatures of known threats
  • To monitor network traffic for known vulnerabilities
  • To detect new and unknown threats
  • To identify abnormal patterns or behaviors that may indicate an intrusion

Which component of an IDS is responsible for collecting data and network traffic?

  • Console
  • Sensor
  • Analyzer
  • Logger

Operates in the same fashion as a host agent module except that it analyzes LAN traffic and reports the results to the central manager.

  • LAN monitor agent module

Statistical, Knowledge-Based, Machine Learning

  • Classification of anomaly detection approaches

Which of these conditions are a vulnerability factor for a magnetic switch sensors?

  • vibration sensitive

To be of practical use, an IDS should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level. That's hard. Most users are legitimate, after all. This issue is referred to as?

  • The Base-Rate Fallacy

Encode probabilistic relationships among observed metrics.

  • Bayesian Netwroks

Which of the following UNIX/Linux commands can be used to help back up and restore the MBR?

  • BB
  • FDISK
  • DD
  • CP

T/F Taps only allow monitoring

  • T

Which of the following sets the standard for companies that install certificated burglar and fire alarm systems?

  • UL (underwriters laboratory)

ARMs are ____ based, and can be general or specific.

  • Rule

Alarm wires and power, lighting, or Class 1 circuits must be separated by at least

  • 2 inches

Which of the following is a potential advantage of using IDS in a cloud environment?

  • Scalability to adapt to dynamic cloud workloads
  • Improved network encryption
  • Reduced need for regular updates and maintenance
  • Decreased risk of false positives

Approaches use an expert system that classifies observed behavior according to a set of rules that model legitimate behavior. Advantages are that that they are super robust and customizable, but its disadvantages are that it's hard and takes time to develop knowledge from data/come up with good rules. You have to have human analysis.

  • Knowledge Based Approach

Which of the following is a common technique used to detect covert channels in network traffic?

  • Traffic analysis
  • Port scanning
  • MAC filtering
  • IP address randomization

What is the purpose of signature-based detection in an IDS?

  • To identify new and unknown threats
  • To detect known patterns or signatures of known threats
  • To analyze network traffic for anomalies
  • To block all incoming network traffic

Which of the following is NOT a digital data storage type?

  • Magnetic storage devices
  • Optical storage devices
  • Flash memory devices
  • Quantum storage devices

An _____ __________ ______ determines if remaining traffic represents an attack, as well as the severity of the attack.

  • Attack recognition module

Addressable intrusion detection systems

  • have device specified identifiers

What is a common evasion technique used to bypass signature-based IDS?

  • Polymorphic malware
  • Heuristic analysis
  • Behavior analysis
  • Encryption

Which type of IDS monitors activities on a single host or device?

  • Network-based IDS (NIDS)
  • Host-based IDS (HIDS)
  • Application-based IDS (AIDS)
  • Behavior-based IDS (BIDS)

Groups of hackers sponsored by governments to conduct espionage or sabotage activities. Known also as Advanced Persistent Threats due to covert nature and persistence over extended periods involved with many attacks in this class.

  • State-sponsored organizations

Inline or Passive Mode

  • 2 types of network sensors

Anomaly detection.

  • Which analysis approach can detect zero-day attacks?

A weakness of Host based IDS systems is that each host must maintain its own ___

  • IDS

A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.

  • Intrusion Detection

Which of the following is a data structure situated at sector 1 in the volume boot record of a hard disk to explain the physical layout of a disk volume?

  • Boot Parameter Block (BPB)
  • BIOS Parameter Block (BPB)
  • Primary Sequential Sector (PSS)
  • Primary Reserved Sector (PRS)

The ID component/process for which the operator manages the various components of the ID system. Management functions typically include sensor configuration, analyzer configuration, event notification management, data consolidation, and reporting

  • Manager

A Host based IDS contains automated log parsers that check system and application logs for ________

  • anomalies

Spread among hosts can be detected in more than one way. Some worms propagate quickly and use large amounts of bandwidth. Worms can also be detected because they can cause hosts to communicate with each other that typically do not, and they can also cause hosts to use ports which they normally don't' use. Many worms also perform scanning.

  • Worms

Which of the following is NOT a legitimate authorizer of a search warrant?

  • Magistrate
  • Court of law
  • First responder
  • Concerned authority

Which group of value is needed to compute standby battery capacity?

  • total normal amps, total alarm amps, de-rating factor

Which of the following specifications is used as a standard to define the use of file systems on CD-ROM and DVD media?

  • ISO 9431
  • ISO 6990
  • ISO 1349
  • ISO 9660

Analysis of the observed behavior using univariate, multivariate, or time-series models of observed metrics. Good because they are simple/low computation cost, but are difficult to pick which metrics you should use and you can't determine all kinds of behaviors.

  • Statistical Approach

Sufficient technical skills to modify and extend attack toolkits to use newly discovered, or purchased, vulnerabilities; or to focus on different target groups. May be able to locate new vulnerabilities to exploit. A number at this skill level found in all classes.

  • Journeyman

Which of the following ISO 9660–compliant portions of a compact disc describes the location of the contiguous root directory similar to the super block of the UNIX file system?

  • The primary track sector
  • The secondary volume descriptor
  • The primary volume descriptor
  • The secondary track sector

A material that neither absorbs nor reflects microwave energy is

  • glass

Intrusion detection message exchange requirements, intrusion detection message exchange format, intrusion detection exchange protocol

  • Intrusion Detection Exchange Format RFCs

A Host based IDS has more ________ than network IDSs; they closely target malicious activity for single OSs

  • resolution

Denial of Service, Scanning, Worms

  • Attacks that are suitable for NIDS anomaly detection

Statistic Packet Anomaly Detection Engine (SPADE)

  • Popular NIDS product

IDSs check for patterns of known ______ and activities indicating malicious ______

  • malware, intent

T/F A host based IDS can provide coverage for multiple machines

  • F (Only a single host)

High level tech skills capable of discovering brand new categories of vulnerabilities, or writing new powerful attack toolkits.

  • Master

Which of the following is a potential drawback of using a firewall in network security?

  • It generates too many false positives
  • It is ineffective against known threats
  • It can create a single point of failure in the network
  • It requires extensive computational resources

Where the attacker disables or edits audit logs, to remove evidence of attack activity, and uses rootkits and other measures to hide covertly installed files or code.

  • Covering Tracks

What is the primary purpose of an Intrusion Detection System (IDS)?

  • To prevent all network attacks
  • To detect and alert on suspicious activities and potential security breaches
  • To encrypt all network traffic
  • To improve network performance

Which of the following is NOT a common phase in the operation of an IDS?

  • Evasion
  • Detection
  • Alerting
  • Logging

Which item describes the following UEFI boot process phase? (The phase of EFI consisting of clearing the UEFI program from memory, transferring the UEFI program to the OS, and updating the OS calls for the run time service using a small part of the memory.)

  • RT (Run Time) Phase
  • PEI (Pre-EFI Initialization) Phase
  • BDS (Boot Device Selection) Phase
  • DXE (Driver Execution Environment) Phase

Which of the following is a passive IDS?

  • Snort
  • Suricata
  • Bro
  • Zeek

What is the primary purpose of an Intrusion Detection and Prevention System (IDPS)?

  • To detect and respond to suspicious activities and potential security breaches
  • To encrypt network traffic
  • To monitor network traffic for known vulnerabilities
  • To improve network performance

The purpose of recording loop resistance during testing is to aid in

  • future trouble shooting

Enables a user to view output from the system or control the behavior of the system. May be the manager/director/console component.

  • User Interface

What are the six components of an intrusion systems

  • detection devices, annunciation devices, control panel, control units, communication devices, power supplies (primary and back up)

Which of the following is a potential drawback of using an Intrusion Detection and Prevention System (IDPS)?

  • False positives can disrupt legitimate network traffic and operations
  • It generates too many false negatives
  • It cannot detect known threats
  • It requires extensive computational resources

Involves the collection of data relating to the behavior of legitimate users over a period of time. Then current observed behavior is analyzed to determine with a high level of confidence whether this behavior is that of a legitimate user or an intruder.

  • Anomaly Detection

What is the main drawback of using only signature-based detection in an IDS?

  • It requires a large amount of computational resources.
  • It cannot detect new or zero-day attacks.
  • It is ineffective against known threats.
  • It generates too many false positives.

Which of the following is important to consider when installing a bell?

  • use large gauge wire to prevent weak output from line loss

Signature and Rule-based heuristic identification

  • Approaches to Signature/Heuristic Detection

What is the primary goal of obfuscation in the context of IDS evasion?

  • To slow down network traffic
  • To make malicious code or traffic appear benign or non-malicious
  • To generate more alerts in the IDS
  • To encrypt network traffic

The initial access to a target system, typically by exploiting a remote network vulnerability, by guessing weak authentication credentials used in a remote service, or via the installation of malware on the system using some form of social engineering or drive-by download.

  • Initial Access

In ______ Net IDS screening, the IDS is implemented in promiscuous mode to monitor traffic to all hosts. It may be hidden so as to not send traffic.

  • Passive

The NIDS attempts to determine if the activity on a transport connection is consistent with the expected application protocol. An example is a host running an unauthorized application service.

  • Unexpected application services

A response module can ___ attacks, send a real-time _____ to the admin, or actively ____ traffic.

  • Log, alert, block

Simulate human brain operation with neurons and synapses between them that classify observed data.

  • Neutral Netwroks

Which of the following is the correct number of bytes reserved at the beginning of a CD-ROM for booting a computer?

  • 16,384
  • 32,768
  • 512
  • 256

More common than inline sensors. They monitor a copy of network traffic; the actual traffic does not pass through the device. From the point of view of traffic flow, the passive sensor is more efficient than an inline sensor, because it does not add an extra handling step that contributes to packet delay.

  • Passive Sensors

Uses a set of known malicious data patterns (signatures) or attack rules (heuristics) that are compared with current behavior to decide if it is of an intruder. Also known as misuse detection. Only can identify known attacks for which it has patterns/rules.

  • Signature/Heuristic Detection

What partition holds the information regarding the operating system, system area, and other information required for booting?

  • Extended partition
  • Tertiary partition
  • Primary partition
  • Secondary partition

Which field type refers to the volume descriptor as a partition descriptor?

  • Number 2
  • Number 0
  • Number 3
  • Number 1

Approaches automatically determine a suitable classification model from the training data using data mining techniques. Disadvantage is that this process typically requires significant time and computational resources, but once it's done, it has a good analysis. Uses data mining techniques.

  • Machine Learning Approach

A tap has ___ interfaces representing the traffic crossing it

  • two

Either individuals, usually working as insiders, or members of a larger group of outsider attackers, who are motivated by social or political causes. Known as hacktivists. Often of a low skill level. Aim of attack is to promote/publicize their cause, typically through website defacement, DoS, or theft of data.

  • Activists

Where the attacker identifies and characterizes the target systems using publicly available information, both technical/non- technical and the use of network exploration tools to map target resources.

  • Target Acquisition and Information Gathering

What is the primary purpose of MAC filtering in network security?

  • To control access to the network based on the device's hardware address
  • To analyze network traffic
  • To generate alerts for suspicious activities
  • To encrypt network traffic

Anti-virus/anti-malware software.

  • What kind of products are signature/heuristic HIDS used in?

What is the primary purpose of a firewall in network security?

  • To monitor and control incoming and outgoing network traffic based on predetermined security rules
  • To analyze network traffic
  • To generate alerts for suspicious activities
  • To slow down network traffic

A local intrusion detection system alerts

  • only the occupants of a secured area

How many bytes is each logical block in GPT?

  • 256
  • 128
  • 512
  • 1,024

Examples include use of inappropriate websites and use of forbidden application protocols.

  • Policy Violations

What does the term "baseline" refer to in the context of IDS?

  • The normal or expected behavior of a network or system
  • A known pattern of a specific attack
  • A list of known vulnerabilities
  • The rate of false positives generated by the IDS

First, these tools may not recognize new threats or radical modifications of existing threatsSecond, it is difficult to update schemes rapidly enough to deal with quickly spreading attacks.

  • Two problems of distributed/hybrid IDS

Every alarm system must have standby power sufficient to operate the system in a non-alarm status for a minimum of

  • four hours

Which of the following basic partitioning tools displays details about GPT partition tables in Linux OS?

  • Fdisk
  • GNU Parted
  • Disk Utility
  • DiskPart

The danger of a short transmission link on an outdoor microwave installation is the signal will be too

  • strong preventing intruders from reflecting a significant signal

Such attacks involve either significantly increased packet traffic or significantly increase connection attempts, in an attempt to overwhelm the target system.

  • Denial of Service Attack

What is the main difference between Intrusion Detection Systems (IDS) and antivirus software?

  • IDS monitors and detects suspicious activities and potential security breaches, while antivirus software detects and removes malicious software
  • IDS encrypts network traffic, while antivirus software monitors host-based activities
  • IDS can block all incoming network traffic, while antivirus software cannot
  • IDS only detects known threats, while antivirus software detects both known and unknown threats

What does the term "zero-day vulnerability" refer to in the context of network security?

  • To monitor network traffic for suspicious activities
  • To analyze network traffic for known vulnerabilities
  • A security vulnerability that is unknown to the vendor or public and has no available fix
  • To generate alerts for suspicious activities

Which item describes the following UEFI boot process phase? (The phase of EFI consisting of initialization code the system executes after powering the system on, manages platform reset events, and sets the system state.)

  • BDS (Boot Device Selection) Phase
  • PEI (Pre-EFI Initialization) Phase
  • DXE (Driver Execution Environment) Phase
  • SEC (Security) Phase

T/F IDSs are Operating System independent.

  • T

What is the main limitation of using encryption to bypass IDS detection?

  • It generates too many false positives.
  • It is not effective against known threats.
  • It can hide the content of network traffic from the IDS.
  • It requires extensive computational resources.

Host-based, Network-based, Distributed/Hybrid

  • Types of IDSs

Which of these is vulnerable to false alarms from large pets and are easily circumvented if an intruder steps over them

  • pressured mats

An intrusion system that allows multiple signals from several sensors to be sent and received over a single communications line is a(n)

  • multiplex system

An ___ is any system that tries to detect potential attacks launched against a host or network

  • IDS

Most modern operating systems include accounting software that collects information on user activity. The advantage of using this information is that no additional collection software is needed. The disadvantages are that the audit records may not contain the needed information or may not contain it in a convenient form, and that intruders may attempt to manipulate these records to hide their actions.

  • Audit (log file) records

Host based IDSs are _____ based analyzers, integrating into the host __ stack

  • stack, IP

In MS-DOS and earlier versions of Microsoft Windows, which partition must be first and a primary partition?

  • (C:)
  • (B:)
  • (A:)
  • (D:)

The type of magnetic switch that is most difficult for an intruder to defeat is

  • balanced magnetic reed

Develop a model with sets of states, some possibly hidden, interconnected by transition probabilities.

  • Markov Models

How large is the partition table structure that stores information about the partitions present on the hard disk?

  • 32-bit
  • 32-byte
  • 64-bit
  • 64-byte

System call traces, audit (log file) records, file integrity checksums, registry access

  • Data Sources and Sensors for a Host-Based Intrusion System

Which field type refers to the volume descriptor as a primary?

  • Number 3
  • Number 1
  • Number 2
  • Number 0

Receive input from one or more sensors or from other of themselves. Responsible for determining if an intrusion has occurred. The output of this component is an indication that an intrusion has occurred. The output may include evidence supporting the conclusion that an intrusion occurred.

  • Analyzers

A characteristic of a motor-driven bell is that it

  • is not susceptible to electrical interference

NIDSs analyze TCP and UDP traffic and perhaps other protocols. Examples of attacks are unusual packet fragmentation, scans for vulnerable ports, and TCP-specific attacks such as SYN floods.

  • Transport Layer reconnaissance and attacks

A _____ _____ ______ filters out all known safe traffic, reducing the load on more detailed filters

  • Network Filter Module

Match a large collection of known patterns of malicious data against data stored on a system or in transit over a network. The signatures need to be large enough to minimize the false alarm rate, while still detecting a sufficiently large fraction of malicious data. This approach is widely used in anti-virus products.

  • Signature Approaches

Which of the following is one of the five UEFI boot process phases?

  • PAI Phase
  • PEI Phase
  • BSD Phase
  • PIE Phase

A _______ _____ determines what action to take given a specific attack

  • Response module

A control panel output that is taken directly from a transistor is a(n)

  • open collector outputs

T/F A Network IDS cannot protect form local attacks or copying

  • T

Which of the following Windows operating systems powers on and starts up using only the traditional BIOS-MBR method?

  • Windows 7
  • Windows 8
  • Windows 9
  • Windows 10

Which of the following is not a common type of IDS?

  • Host-based IDS (HIDS)
  • Network-based IDS (NIDS)
  • Internet-based IDS (IBIDS)
  • Application-based IDS (AIDS)

T/F placing the IDS on a shared network segment can result in performance issues

  • T

Which of the following is NOT a common evasion technique used to bypass IDS?

  • Multifactor authentication
  • Encryption
  • Obfuscation
  • Fragmentation

UL local Grade B control panels have how many seconds of attack resistance?

  • 45 seconds

Host agent module, LAN monitor agent module, central manager module

  • 3 Main Components of the UC-Davis distributed HIDS

Which of the following is NOT where potential evidence may be located?

  • Thumb drive
  • Digital camera
  • Smart card
  • Processor

A record of the sequence of systems calls by processes on a system is widely acknowledged as the preferred data source of HIDS. Doesn't work well on Windows due to the extensive use of DLLs that obscure which processes make specific system calls.

  • System call traces

Which of the following is a potential limitation of using anomaly-based detection in an IDS?

  • It can generate false positives for unusual but legitimate activities
  • It is resource-intensive and slows down network performance
  • It is ineffective against known threats
  • It cannot detect new or zero-day attacks

T/F Host based IDSs require no additional hardware or network infrastructure

  • T

T/F Active screening does not cause performance issues.

  • F (Can case serious issues)

Consists of a software package that emulates particular IT services or systems well enough to provide a realistic initial interaction, but does not execute a full version of these services/systems.

  • Low Interaction Honeypot

What is the primary purpose of a Intrusion Detection System (IDS) in a cloud environment?

  • To analyze network traffic
  • To improve network performance
  • To generate alerts for suspicious activities
  • To monitor and detect potential intrusions and security threats in the cloud environment

What does the term "honeypot" refer to in the context of network security?

  • A decoy system or network designed to lure and monitor attackers
  • A type of IDS sensor
  • A form of encryption
  • A tool for analyzing network traffic

Anomaly, Signature/Heuristic, Distributed

  • Types of HIDS

T/F An IDS prevents network penetration.

  • F (Detects, does not prevent)

Which of the following is NOT part of the Computer Forensics Investigation Methodology?

  • Secure the evidence.
  • Collect the evidence.
  • Destroy the evidence.
  • Assess the evidence.

Which item describes the UEFI boot process phase in which the majority of the initialization occurs?

  • PEI (Pre-EFI Initialization) Phase
  • DXE (Driver Execution Environment) Phase
  • BDS (Boot Device Selection) Phase
  • RT (Run Time) Phase

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.

  • Security Intrusion

What is a standard partitioning scheme for hard disks and part of the Unified Extensible Firmware Interface (UEFI)?

  • UEFI Partition Table (UPT)
  • Universal Partition Table (UPT)
  • General Partition Table (GPT)
  • GUID Partition Table (GPT)

Which field is the standard identifier set to CD001 for a CD-ROM compliant to the ISO 9660 standard?

  • Third
  • Fourth
  • Second
  • First

Collects data from data source, forwards to analyzer.

  • Sensors (DMX)

Describes the Intrusion Detection Exchange Protocol (IDXP), an application level protocol for exchanging data between intrusion detection entities. IDXP supports mutual-authentication, integrity, and confidentiality over a connection-oriented protocol.

  • Intrusion Detection Exchange Protocol

What is the purpose of a decoy in the context of network security?

  • To mislead and confuse attackers
  • To analyze network traffic
  • To generate alerts for suspicious activities
  • To slow down network traffic

T/F A network IDS is capable of capturing traffic that may be filtered out at the host.

  • T

GUIDs are displayed as how many hexadecimal digits with groups separated by hyphens?

  • 64
  • 128
  • 32
  • 256

Which type of IDS uses statistical models and machine learning algorithms to detect anomalies?

  • Host-based IDS (HIDS)
  • Behavior-based IDS (BIDS)
  • Network-based IDS (NIDS)
  • Signature-based IDS (SIDS)

An interior sensor that provides narrow or wide detection for high traffic areas uses

  • a trap

Which type of IDS is typically used to monitor web applications and protect against web-based attacks?

  • Host-based IDS (HIDS)
  • Web Application Firewall (WAF)
  • Network-based IDS (NIDS)
  • Behavior-based IDS (BIDS)

A visual evaluation to verify or confirm that something appears as desired is a(n)

  • inspection

Monitors the characteristics of a single host and the events occurring within that host, such as process identifiers and the system calls they make, for evidence of suspicious activity.

  • Host-based IDS

Network IDSs are usually limited in scope by __________ to external attacks

  • architecture

Which of the following Federal Rules of Evidence governs proceedings in the courts of the United States?

  • Rule 105
  • Rule 102
  • Rule 103
  • Rule 101

What is the primary goal of a Distributed Denial of Service (DDoS) attack?

  • To analyze network traffic
  • To overwhelm a system or network, making it unavailable to users
  • To use multiple compromised devices to flood a target with traffic
  • To generate alerts for suspicious activities

What is the primary function of a network-based IDS (NIDS)?

  • To monitor and protect individual hosts
  • To monitor network traffic for suspicious activities and threats
  • To encrypt network traffic
  • To analyze application-layer data

T/F Host based IDSs cannot see into encrypted traffic

  • F (They can)

Which of the following is NOT a recommended practice when deploying an IDS?

  • Hiding the presence of the IDS to catch attackers off guard
  • Placing the IDS at the edge of the network
  • Regularly updating and tuning the IDS rules
  • Monitoring IDS alerts and logs

Most NIDS technologies analyze several dozen application protocols, such as DHCP, DNS, FTP, HTTP, IMAP, IRC, NFS, POP, RSH, Remote Procedure Call, SIP, Server Message Block, SMTP, SNMP, Telnet., as well as database protocols, IM applications, and peer-to-peer file sharing software. The NIDS is looking for attack patterns that have been identified as targeting these protocols. Attack examples include buffer overflows, password guessing, and malware transmission.

  • Application Layer reconnaissance and attacks:

Sensors, Analyzers, User Interface

  • 3 Logical Components of an IDS

Most Network based IDSs are ______ in nature

  • modular

Which of the following applies to installations of outdoor active infrared pulsed multi-beam photoelectric units?

  • clearance for objects on either side of a beam must be 2 to 3 feet

In the GUID Partition Table, which Logical Block Address contains the Partition Entry Array?

  • LBA 2
  • LBA 0
  • LBA 3
  • LBA 1

What must an investigator do in order to offer a good report to a court of law and ease the prosecution?

  • Prosecute the evidence
  • Obfuscate the evidence
  • Authorize the evidence
  • Preserve the evidence

Because individual hosts must maintain host IDSs, there is increased ___________ and reduced system _________.

  • administration, performance

Application Layer and reconnaissance attacks, Transport Layer reconnaissance and attacks, Network Layer Reconnaissance and attacks, Unexpected application services, and policy violations

  • Types of attacks that are suitable for NIDS signature detection

Occurs when an attacker probes a target network/system by sending different kinds of packets. Using the responses received from the target, the attacker can learn many of the system's characteristics and vulnerabilities. Thus acts as a target identification tool for an attacker. Scanning can be detected by atypical flow patterns at the application layer, transport layer, and network layer.

  • Scanning

What is the purpose of the "logging" phase in the operation of an IDS?

  • To identify and respond to intrusions
  • To generate alerts
  • To record information about events for analysis and reporting
  • To store data about network activity

Target Acquisition and Information Gathering, Initial Access, Privilege Escalation, Covering Tracks

  • Intruder Behaviors

The human that is the primary user of the IDS manager. The operator often monitors the output of the IDS and initiates or recommends further action.

  • Operator

When blocking traffic, one can close the connection by sending a TCP ___ flag to both ends

  • FIN

Which of the following is a potential drawback of using honeypots for network security?

  • False positives can occur if legitimate users interact with the honeypot.
  • It is difficult to set up and configure.
  • It requires extensive computational resources.
  • Honeypots are easily detected by attackers.

An audit collection module operating as a background process on a monitored system. Its purpose is to collect data on security related events on the host and transmit these to the central manager.

  • Host Agent Module

T/F Placing a network IDS outside the firewall may overwhelm it due to the amount of traffic

  • T

A NFM can create problems if bad traffic is being ______ to look like good traffic

  • spoofed

Which of the following is a common technique used in a SYN Flood attack?

  • To analyze network traffic
  • Sending a flood of SYN packets to exhaust server resources
  • Generating alerts for suspicious activities
  • Slowing down network traffic

Cyber criminals, activists, state-sponsored organization's, others

  • Classes of Intruders:

Which of these electric field sensors is considered the most reliable?

  • triple wire

Summary events, DDI events, PEP events

  • Types of input that guide the actions of a SIEM central System
Comments
Buy Me Coffee

To keep up this site, we need your assistance. A little gift will help us alot.

Donate

- The more you give the more you receive.

Related Subject

Huawei Smartphone Innovation

Social Security Fairness Act

Operating System Functions

Web Application Development

Web Systems Technologies

Web Development

Network Administration

Health Information Technology

Computer Support Technician

Computer Information Systems

Risk Management Applied to Safety Security and Sanitation

Property Management System

Investment and Portfolio Management

Information Assurance and Security 3

Information Security and Management

Information Management

Information Assurance and Security 2

Fundamentals of Investigation and Intelligence

Fundamentals of Database System

Cyber Security: Theories and Practice

Advanced Database Management Systems

Southwest Airlines Overview

The Science of SpaceX Satellites

Vibrant Triangle Indian Community

Computer System

Database Management System

Tropical Cyclone 18: What to Expect as Rafael Approaches the First Coast

Avian Flu Variant in Wastewater Studies

Understanding the Implications of the First US Bird Flu Case in a Pig

Nursing Interventions: Ineffective Breathing Pattern

Targeted Individuals

Drone Technlogy and Applications

Risk Management

Project Management

Computer Science

Professional Ethics in Information Technology

Network Security

Application Development and Emerging Technology

Mechatronics

Industrial Electronics Maintenance

Electronics Engineering Technology

Fundamentals of Mixed Signals and Sensors

Retail Sales Surge in October

Minnesota Vikings: A Deep Dive into the Team's 2024 Season

Massage Machines

Knowledge Management

Retail Merchandising

Forensic Science

Geographic Information Systems

Engineering

System Analysis Design and Development

Thesis Writing 2

Strategic Business Analysis

Reading and Writing Skills

Quantitative Methods

Real Estate Consulting and Investment Analysis

Research in Psychology 2

Introduction to Information Systems

International Marketing

Data Structures and Algorithms

Application Lifecycle Management

Modeling and Simulation

Algorithms and Complexity

Lung Cancer Screening Awareness

Public Safety Dispatcher

Emergency and Disaster Management


Show All Subject
Affiliate Links

Shopee Cashback Voucher

Temu $0 Shipping Fee