Week 8 Quiz

Week 8 Quiz

Part 1 of 1 -
100.0 Points

Question 1 of 15
7.0 Points
Which of the following properly describes an IDS system?



A.It prevents attacks.


B.It only detects attacks.


C.It cannot detect anomalies.


D.It detects only e-mail attacks.


Answer Key: B


Question 2 of 15
7.0 Points
A system that assigns access controls to an individual based on their job is an example of which of the following?



A.DAC


B.RBAC


C.MAC


D.RMAC


Answer Key: B


Question 3 of 15
7.0 Points
Which of the following is a use for a honeypot?



A.Layered security


B.Research into hacker methods


C.Rewarding appropriate behavior


D.Capture of usernames and passwords


Answer Key: B


Question 4 of 15
7.0 Points
Which of the following is a use for a honeynet?



A.Detecting network attacks and scans


B.Slowing down attackers


C.Concealing network resources


D.Defense in depth


Answer Key: A


Question 5 of 15
7.0 Points
Which of the following best describes a stateful firewall?



A.It tracks geographic locations of connections.


B.It prevents TCP traffic from being sent as UDP traffic.


C.It keeps a table of traffic that it must block.


D.It tracks connections from beginning to end.


Answer Key: D


Question 6 of 15
7.0 Points
Which of the following best describes a proxy firewall?



A.It sends traffic through another host.


B.It acts as a gateway for requests arriving from the client.


C.It checks only the IP and protocol.


D.It is typically run on the host system.


Answer Key: B


Question 7 of 15
7.0 Points
Deploying an IDS into an environment for which it is not designed can fail for which of the following reasons?



A.Warnings may be incorrect


B.Warnings may be irrelevant


C.Both A and B


D.Neither A nor B


Answer Key: C


Question 8 of 15
7.0 Points
Which of the following provides the ability to monitor a...

Similar Essays