Security School

Intrusion Defense Final Exam: Answer explanations

1.) Answer from Article 1: c. Malicious software that is both self-contained and self-propagating.
Read the Lesson 1 article, The role of key technologies in intrusion defense, for a detailed description of viruses, worms and Trojan horses.

2.) Answer: d. Networks with lots of connection points, and little or no monitoring and management capabilities in use.
Read the Lesson 5 article, The future of intrusion defense, to learn more about how black box networks develop.

3.) Answer: d. Less spam gets past antispam defenses (than viruses) and fewer messages are misclassified as spam (than viruses).
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn more about the differences between antispam and antivirus defense.

4.) Answer: b. Identity of the user
Listen to the Lesson 5 webcast, Perimeter defense in the era of the perimeterless network, to learn more about the future of intrusion defense.

5.) Answer: d. All of the above.
Read the Lesson 5 article, The future of intrusion defense, to learn how to cope with the consequences of a network with many distributed control points.

6.) Answer: c. Leak protection tools
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn more about regulatory controls.

7.) Answer: d. All of the above
Read the Lesson 1 article, The role of key technologies in intrusion defense, for a better understanding of malware behavior and virus scanners.

8.) Answer: a. Whatever antivirus you're running at the desktop, run it at the perimeter.
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, for tips on building perimeter antivirus.

9.) Answer: c. Make the calculation of costs and expected benefits for any intrusion defense.
Listen to the Lesson 4 webcast, Making the business case for intrusion defense, to learn more best practices for making the business case for intrusion defense.

10.) Answer: d. Edge e-mail security appliance; desktop
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, for a better understanding of antivirus perimeter defense.

<< Return to exam

<< Return to Intrusion Defense School

This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: