Security School

Intrusion Defense Entrance Exam: Answer explanations

1.) Answer: c. Antivirus
Listen to the Lesson 3 webcast, Understanding Threat Management, to learn about the strengths and weaknesses of UTM.

2.) Answer: a. NBAD systems
Read the Lesson 1 article, The role of key technologies in intrusion defense, to better understand how various intrusion defense tools work together to identify and block malware.

3.) Answer: d. Firewall
Listen to the Lesson 4 webcast, Making the case for intrusion defense, to learn more about the differences between intrusion defense technologies.

4.) Answer: b. DoS and DDoS defense tools
Read the Lesson 1 article, The role of key technologies in intrusion defense, to better understand the role of IPS in intrusion defense.

5.) Answer: d. All of the above
Read the Lesson 2 article, Antivirus directions and futures, to better understand the role of in-line antivirus scanners in an intrusion defense strategy.

6.) Answer: a. Damage to the user as a result of spam is not considered significant.
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn how NBAD systems detect phishing attacks.

7.) Answer: b. They are adjuncts to traditional virus scanners.
Read the Lesson 2 article, Antivirus directions and futures, to learn about the latest developments in antivirus technologies.

8.) Answer: c. Firewalls/UTM catch infected systems by behavioral anomaly.
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, to better understand the various components of a holistic AV strategy.

9.) Answer: b. Content filtering
Listen to the Lesson 3 webcast, Understanding Threat Management, to learn about the strengths and weaknesses of UTM.

10.) Answer: a. Performance issues make it nearly impossible to scan all traffic coming into all ports.
Read the Lesson 2 article, Antivirus directions and futures, to learn the pros and cons of in-line antivirus scanners.

<< Return to the exam

<< Return to Intrusion Defense School

This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: