Tutorial test: Advanced intrusion detection

Listen to the webcast first

Take our test while you listen to the webcast. Enjoy!

1. The information security life cycle does NOT include the following
a. Monitor
b. Assess
c. Validate
d. Train staff
e. Start over
f. Chain of evidence

2. ROI is
a. Return over investment
b. Return of investment
c. Return on investment
d. Relay of investment

3. ROI's dilemma includes
a. $100 fence for a $10 horse
b. $10 horse for a $100 fence
c. No return at all
d. All of the above.

4. Proof of ROI is easy ? (True or False)
a. True
b. False

5. ROI is easy to measure
a. True
b. False

6. Advanced IDS suspicious events do NOT include
a. File transfers
b. Denied logon attempts
c. Physical measures
d. System reboots
e. Version of IDS installed

7. Distributed IDS or DIDS allows for centralized attack events?
a. True
b. False

8.. DIDS agents provide a cooperate, yet independent IDS?
a. True
b. False

9. DIDs does NOT provide the following
a. Centralized attack event records
b. Easy method to spot trends
c. Better firewall rule sets
d. none of the above

10. Some IDS obstacles include
a. Confidentiality, compatibility, and education
b. Confidentiality, community, and enterprise
c. Confidentiality, category, and entry
11.. Honeypots provide traps for malicious attempts
a. True
b. False

12. Increasing complexity drives exponential growth in vulnerabilities
a. True
b. False

1. f
2. c
3. a
4. b
5. b
6. e
7. a
8. a
9. c
10. a
11. a
12. a
This was first published in November 2002

Dig Deeper on Network Intrusion Detection (IDS)



Find more PRO+ content and other member only offers, here.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: