1. | The two types of intrusion detection are
|
|
2. | Recording data traveling on a network is known as
|
|
3. | Which of the following is NOT an example of penetration testing?
|
|
4. | Trusted recovery is concerned with
|
|
5. | The third-party inspection of a system is known as a(n)
|
|
6. | One of the primary concerns with long-term audit log retention is
|
|
7. | The required operating state of a network interface on a system running a sniffer is
|
|
8. | Filling a system’s hard drive so that it can no longer record audit records is known as a(n)
|
|
9. | An investigator who needs to have access to detailed employee event information may need to use
|
|
10. | Which of the following is NOT true about a signature-based IDS?
|
|
Answers
1. | B. Signature-based systems and anomaly-based systems. The two types of IDS systems are signature-based and anomaly-based. Review “Intrusion detection and prevention.” |
2. | B. Packet sniffing. Packet sniffing is the technique used to record network traffic. Review “Penetration testing.” |
3. | D. War diving. War diving isn’t a testing technique, but radiation monitoring, war driving, and port scanning are. Review “Penetration testing.” |
4. | B. The vulnerability of a system while it’s being rebuilt. Most operating systems in single-user mode lack the security controls present in a system that’s fully operational. Review “Security Controls.” |
5. | D. Audit. An auditis an inspection of a system or process. Review “Security Auditing and Due Care.” |
6. | D. Whether any tape/disk drives will be available to read them. The challenge with audit log retention is choosing a medium that will be readable many years in the future. Review “Retaining audit logs.” |
7. | B. Promiscuous mode.This is the term that describes the state of a system that is accepting all packets on the network, not just those packets destined for the system. Review “Penetration testing.” |
8. | D. Denial of Service attack. Filling a system’s hard drive is one way to launch a Denial of Service attack on an audit log mechanism. This will prevent the mechanism from being able to write additional entries to the log. Review “Protection of audit logs.” |
9. | A. Keystroke monitoring. Keystroke monitoring records every key press and mouse movement. Review “Keystroke monitoring.” |
10. | C. It reports a high number of false-positives. Signature-based IDSes generally have a low number of false-positives. Review “Intrusion detection and prevention.” |