Intrusion Defense Final Exam: Answer explanations

1.) Answer from Article 1: c. Malicious software that is both self-contained and self-propagating.
Read the Lesson 1 article, The role of key technologies in intrusion defense, for a detailed description of viruses, worms and Trojan horses.

2.) Answer: d. Networks with lots of connection points, and little or no monitoring and management capabilities in use.
Read the Lesson 5 article, The future of intrusion defense, to learn more about how black box networks develop.

3.) Answer: d. Less spam gets past antispam defenses (than viruses) and fewer messages are misclassified as spam (than viruses).
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn more about the differences between antispam and antivirus defense.

4.) Answer: b. Identity of the user
Listen to the Lesson 5 webcast, Perimeter defense in the era of the perimeterless network, to learn more about the future of intrusion defense.

5.) Answer: d. All of the above.
Read the Lesson 5 article, The future of intrusion defense, to learn how to cope with the consequences of a network with many distributed control points.

6.) Answer: c. Leak protection tools
Read the Lesson 1 article, The role of key technologies in intrusion defense, to learn more about regulatory controls.

7.) Answer: d. All of the above
Read the Lesson 1 article, The role of key technologies in intrusion defense, for a better understanding of malware behavior and virus scanners.

8.) Answer: a. Whatever antivirus you're running at the desktop, run it at the perimeter.
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, for tips on building perimeter antivirus.

9.) Answer: c. Make the calculation of costs and expected benefits for any intrusion defense.
Listen to the Lesson 4 webcast, Making the business case for intrusion defense, to learn more best practices for making the business case for intrusion defense.

10.) Answer: d. Edge e-mail security appliance; desktop
Listen to the Lesson 2 webcast, Smart tactics for antivirus and antispyware, for a better understanding of antivirus perimeter defense.

<< Return to exam

<< Return to Intrusion Defense School

This was last published in April 2006

Dig Deeper on Network Intrusion Detection (IDS)

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close