Intrusion Defense Entrance Exam: Answer explanations

1.) Answer: c. Antivirus
Listen to the Lesson 3 webcast, Understanding Threat Management, to learn about the strengths and weaknesses of UTM.

2.) Answer: a. NBAD systems
Read the Lesson 1 article, The role of key technologies in intrusion defense, to better understand how various intrusion defense tools work together to identify and block malware.

3.) Answer: d. Firewall
Listen to the Lesson 4 webcast, Making the case for intrusion defense, to learn more about the differences between intrusion defense technologies.

4.) Answer: b. DoS and DDoS defense tools
Read the Lesson 1 article, The role of key technologies in intrusion defense, to better understand the role of IPS in intrusion defense.

5.) Answer: d. All of the above
Read the Lesson 2 article, Antivirus directions and futures, to better understand the role of in-line antivirus scanners in an intrusion defense strategy.

6.) Answer: a. Damage to the user as a result of spam is not considered significant.
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn how NBAD systems detect phishing attacks.

7.) Answer: b. They are adjuncts to traditional virus scanners.
Read the Lesson 2 article, Antivirus directions and futures, to learn about the latest developments in antivirus technologies.

8.) Answer: c. Firewalls/UTM catch infected systems by behavioral anomaly.
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, to better understand the various components of a holistic AV strategy.

9.) Answer: b. Content filtering
Listen to the Lesson 3 webcast, Understanding Threat Management, to learn about the strengths and weaknesses of UTM.

10.) Answer: a. Performance issues make it nearly impossible to scan all traffic coming into all ports.
Read the Lesson 2 article, Antivirus directions and futures, to learn the pros and cons of in-line antivirus scanners.

<< Return to the exam

<< Return to Intrusion Defense School

This was first published in April 2006

Dig deeper on Network Intrusion Detection (IDS)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close