Intrusion Defense Entrance Exam: Answer explanations

1.) Answer: c. Antivirus
Listen to the Lesson 3 webcast, Understanding Threat Management, to learn about the strengths and weaknesses of UTM.

2.) Answer: a. NBAD systems
Read the Lesson 1 article, The role of key technologies in intrusion defense, to better understand how various intrusion defense tools work together to identify and block malware.

3.) Answer: d. Firewall
Listen to the Lesson 4 webcast, Making the case for intrusion defense, to learn more about the differences between intrusion defense technologies.

4.) Answer: b. DoS and DDoS defense tools
Read the Lesson 1 article, The role of key technologies in intrusion defense, to better understand the role of IPS in intrusion defense.

5.) Answer: d. All of the above
Read the Lesson 2 article, Antivirus directions and futures, to better understand the role of in-line antivirus scanners in an intrusion defense strategy.

6.) Answer: a. Damage to the user as a result of spam is not considered significant.
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn how NBAD systems detect phishing attacks.

7.) Answer: b. They are adjuncts to traditional virus scanners.
Read the Lesson 2 article, Antivirus directions and futures, to learn about the latest developments in antivirus technologies.

8.) Answer: c. Firewalls/UTM catch infected systems by behavioral anomaly.
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, to better understand the various components of a holistic AV strategy.

9.) Answer: b. Content filtering
Listen to the Lesson 3 webcast, Understanding Threat Management, to learn about the strengths and weaknesses of UTM.

10.) Answer: a. Performance issues make it nearly impossible to scan all traffic coming into all ports.
Read the Lesson 2 article, Antivirus directions and futures, to learn the pros and cons of in-line antivirus scanners.

<< Return to the exam

<< Return to Intrusion Defense School

This was last published in April 2006

Dig Deeper on Network Intrusion Detection (IDS)

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close