Infosec Know IT All Trivia: Intrusion detection

How much do you know about intrusiond detection? Find out here.

Test your knowledge of intrusion detection with these trivia questions. Scroll down to the bottom of the page for the correct answers. If you get them all right, you can call yourself an Infosec Know IT All!

1.) Network-based intrusion detection procedures are considered active and include:
a. inspection of the system's configuration files to detect inadvisable settings.
b. inspection of the password files to detect inadvisable passwords.
c. the setting of mechanisms to re-enact known methods of attack.
d. inspection of system areas to detect policy violations.

2.) This type of IDS involves a wrapper or a scanner that looks for specific events. When it sees the event, it correlates it and decides whether or not it's an acceptable event.
a. anomaly detection
b. signature-based
c. blind barricade
d. profile detection

3.) True or False: Hackers can successfully mount slow attacks undetected due to the memory limitations of intrusion-detection systems.
a. True
b. False

4.) There are other places to look for evidence of an intrusion in addition to your IDS. Which of these could you analyze for evidence of an intrusion?
a. System logs
b. Telephone logs
c. File system dates and times
d. Authentication logs
e. All of the above

5.) When building a cost-benefit model for an IDS, you should include:
a. The ROI associated with protecting the corporate reputation.
b. The ROI associated with keeping the corporate stockholders happy.
c. The ROI associated with maintaining continuity of system service.
d. All of the above.






What do you think of our daily trivia questions? Are they too easy? Too hard? Do you disagree with one of our answers? Let me know.












ANSWERS:

1.) c. the setting of mechanisms to re-enact known methods of attack.
For more information on intrusion-detection systems, read Intrusion-detection systems sniff out security breaches

2.) c. blind barricade
For information on choosing the right IDS for your organization's needs, read Recommendations for deploying an intrusion-detection system, by SearchSecurity Expert Ed Yakabovicz.

3.) a. True
For more IDS rules of thumb, read this tip also written by Rebecca Gurley Bace.

4.) e All of the above.
For more information on intrusion detection, visit our Best Web Links.

5.) d. All of the above.
To learn more about ROI and budgeting for security, read this Executive Security Briefing.

This was first published in December 2003

Dig deeper on Network Intrusion Detection (IDS)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close