Part 1 of 1 -
100.0 Points
Question 1 of 15
7.0 Points
Which of the following properly describes an IDS system?
A.It prevents attacks.
B.It only detects attacks.
C.It cannot detect anomalies.
D.It detects only e-mail attacks.
Answer Key: B
Question 2 of 15
7.0 Points
A system that assigns access controls to an individual based on their job is an example of which of the following?
A.DAC
B.RBAC
C.MAC
D.RMAC
Answer Key: B
Question 3 of 15
7.0 Points
Which of the following is a use for a honeypot?
A.Layered security
B.Research into hacker methods
C.Rewarding appropriate behavior
D.Capture of usernames and passwords
Answer Key: B
Question 4 of 15
7.0 Points
Which of the following is a use for a honeynet?
A.Detecting network attacks and scans
B.Slowing down attackers
C.Concealing network resources
D.Defense in depth
Answer Key: A
Question 5 of 15
7.0 Points
Which of the following best describes a stateful firewall?
A.It tracks geographic locations of connections.
B.It prevents TCP traffic from being sent as UDP traffic.
C.It keeps a table of traffic that it must block.
D.It tracks connections from beginning to end.
Answer Key: D
Question 6 of 15
7.0 Points
Which of the following best describes a proxy firewall?
A.It sends traffic through another host.
B.It acts as a gateway for requests arriving from the client.
C.It checks only the IP and protocol.
D.It is typically run on the host system.
Answer Key: B
Question 7 of 15
7.0 Points
Deploying an IDS into an environment for which it is not designed can fail for which of the following reasons?
A.Warnings may be incorrect
B.Warnings may be irrelevant
C.Both A and B
D.Neither A nor B
Answer Key: C
Question 8 of 15
7.0 Points
Which of the following provides the ability to monitor a...