Tutorial test: Advanced intrusion detection

Listen to the webcast first

Take our test while you listen to the webcast. Enjoy!

1. The information security life cycle does NOT include the following
a. Monitor
b. Assess
c. Validate
d. Train staff
e. Start over
f. Chain of evidence

2. ROI is
a. Return over investment
b. Return of investment
c. Return on investment
d. Relay of investment

3. ROI's dilemma includes
a. $100 fence for a $10 horse
b. $10 horse for a $100 fence
c. No return at all
d. All of the above.

4. Proof of ROI is easy ? (True or False)
a. True
b. False

5. ROI is easy to measure
a. True
b. False

6. Advanced IDS suspicious events do NOT include
a. File transfers
b. Denied logon attempts
c. Physical measures
d. System reboots
e. Version of IDS installed

7. Distributed IDS or DIDS allows for centralized attack events?
a. True
b. False

8.. DIDS agents provide a cooperate, yet independent IDS?
a. True
b. False

9. DIDs does NOT provide the following
a. Centralized attack event records
b. Easy method to spot trends
c. Better firewall rule sets
d. none of the above

10. Some IDS obstacles include
a. Confidentiality, compatibility, and education
b. Confidentiality, community, and enterprise
c. Confidentiality, category, and entry
11.. Honeypots provide traps for malicious attempts
a. True
b. False

12. Increasing complexity drives exponential growth in vulnerabilities
a. True
b. False

Answers:
1. f
2. c
3. a
4. b
5. b
6. e
7. a
8. a
9. c
10. a
11. a
12. a
This was last published in November 2002

Dig Deeper on Network intrusion detection and prevention (IDS-IPS)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close