Intrusion Defense Final Exam Answers

1.) Answer: c. Malicious software that is both self-contained and self-propagating.
Read the Lesson 1 article, The role of key technologies in intrusion defense, for a detailed description of viruses, worms and Trojan horses.
























































2.) Answer: d. Networks with lots of connection points, and little or no monitoring and management capabilities in use.
Read the Lesson 5 article, The future of intrusion defense, to learn more about how black box networks develop.
























































3.) Answer: d. Less spam gets past antispam defenses (than viruses) and fewer messages are misclassified as spam (than viruses).
Read the Lesson 1 article,
The role of key technologies in intrusion defense, to learn more about the differences between antispam and antivirus defense.
























































4.) Answer: b. Identity of the user
Listen to the Lesson 5 webcast, Perimeter defense in the era of the perimeterless network, to learn more about the future of intrusion defense.
























































5.) Answer: d. All of the above.
Read the Lesson 5 article,
The future of intrusion defense, to learn how to cope with the consequences of a network with many distributed control points.
























































6.) Answer: c. Leak protection tools
Read the Lesson 1 article,
The role of key technologies in intrusion defense, to learn more about regulatory controls.
























































7.) Answer: d. All of the above
Read the Lesson 1 article,
The role of key technologies in intrusion defense, for a better understanding of malware behavior and virus scanners.
























































8.) Answer: a. Whatever antivirus you're running at the desktop, run it at the perimeter.
Listen to the Lesson 2 webcast,
Smart tactics for antivirus and antispyware, for tips on building perimeter antivirus.
























































9.) Answer: c. Make the calculation of costs and expected benefits for any intrusion defense.
Listen to the Lesson 4 webcast,
Making the business case for intrusion defense, to learn more best practices for making the business case for intrusion defense.
























































10.) Answer: d. Edge e-mail security appliance; desktop
Listen to the Lesson 2 webcast,
Smart tactics for antivirus and antispyware, for a better understanding of antivirus perimeter defense.

This was first published in May 2006

Dig deeper on Network Intrusion Detection (IDS)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close