SlideShare a Scribd company logo
1 of 2
Download to read offline
Need the mutiple choice answered uslde .An)_can omunicate with a system inside a firewall
system to be used to filter out undesirable traffic and prevent employees from accessing
potentially hostile web sites Multiple-Choice Quiz e three types of event logs generated What are
the three t t bw Windows Which of the following is not a capability of 6. Windows 2003 and
Vista by A. Event, Process, and Security B. Application, User, and Security c. User, Event, and
Security network-based IDS A. Can detect denial-of-service attacks B. Can decrypt and read
encrypted traffic C. Can decode UDP and TCP packets D. Can be tuned to a particular network
Application, System, and Security What are the two main types of intrusion detection systems?
A. Network-based and host-based B. Signature-based and event-based C. Active and reactive D.
Intelligent and passive environment An active IDS can: A. Respond to attacks with TCP resets
B. Monitor for malicious activity C. A and B D. None of the above Honeypots are used to: , 7. s.
What was the first commercial, network-based 8. IDS product? A. Stalker B. NetRanger C. IDES
D. RealSecure What are the two main types of IDS signatures? 9. Egress filtering is used to
detect spam that is: A. Network-based and file-based B. Context-based and content-based C
Active and reactive A. Attract attackers by simulating systems with open network services B.
Monitor network usage by employees C. Process alarms from other IDSs D. Attract customers to
e-commerce sites A. Coming into an organization B. Sent from known spammers outside your
organization C. Leaving an organization D. Sent to mailing lists in your organization
Preventative intrusion detection systems: A. Are cheaper B. D. None of the above . Which of the
following describes a passive, host based IDS? 10. A. Runs on the local system Are designed to
stop malicious activity from occurring B. Does not C. Can l D. All of the above not interact with
the traffic around it C. Can only monitor activity D. Were the first types of IDS ook at system
event and error logs r 13:Indusion Detection Systems Detection Systems and Network Security
Solution
1. What are the three types of event logs generated by Windows 2003 and Vista systems?
D. Application, System, and Security
2. What are the two main types of intrusion detection systems?
A. Network-based and host-based
3. What was the first commercial, network-based IDS product?
B. NetRanger
4. What are the two main types of IDS signatures?
B. Context-based and content-based
5. Which of the following describes a passive, host-based IDS?
D. All of the above
6. Which of the following is not a capability of network-based IDS?
B. Can decrypt and read encrypted traffic
7. An active IDS can:
C. A and B
8. Honeypots are used to:
A. Attract attackers by simulating systems with open network services
9. Egress filtering is used to detect spam that is:
C. Leaving an organization
10. Preventative intrusion detection systems:
B. Are designed to stop malicious activity from occurring

More Related Content

Similar to Need the mutiple choice answered uslde .An)_can omunicate with a sys.pdf

1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
sandibabcock
 
IDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfIDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdf
mckenziecast21211
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
HHoko1
 

Similar to Need the mutiple choice answered uslde .An)_can omunicate with a sys.pdf (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Modul 1-sample-test
Modul 1-sample-testModul 1-sample-test
Modul 1-sample-test
 
Ids 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsIds 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systems
 
IRJET- A Review on Intrusion Detection System
IRJET-  	  A Review on Intrusion Detection SystemIRJET-  	  A Review on Intrusion Detection System
IRJET- A Review on Intrusion Detection System
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
IDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdfIDS in the Cloud Please respond to the following(a) Explain w.pdf
IDS in the Cloud Please respond to the following(a) Explain w.pdf
 
CEHv8 practice Exam with key
CEHv8 practice Exam with keyCEHv8 practice Exam with key
CEHv8 practice Exam with key
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Five IDS mistakes people make
Five IDS mistakes people makeFive IDS mistakes people make
Five IDS mistakes people make
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
 

More from arjuncorner565

Write about Participatory Design Issues and Concerns (use your own.pdf
Write about Participatory Design Issues and Concerns (use your own.pdfWrite about Participatory Design Issues and Concerns (use your own.pdf
Write about Participatory Design Issues and Concerns (use your own.pdf
arjuncorner565
 
The difference between vertical and horizontal transmission of plant .pdf
The difference between vertical and horizontal transmission of plant .pdfThe difference between vertical and horizontal transmission of plant .pdf
The difference between vertical and horizontal transmission of plant .pdf
arjuncorner565
 
Question 7 (2 points)A researcher conducts a study on the realtion.pdf
Question 7 (2 points)A researcher conducts a study on the realtion.pdfQuestion 7 (2 points)A researcher conducts a study on the realtion.pdf
Question 7 (2 points)A researcher conducts a study on the realtion.pdf
arjuncorner565
 
Need a strong biologistgeneticist to answer this P element question.pdf
Need a strong biologistgeneticist to answer this P element question.pdfNeed a strong biologistgeneticist to answer this P element question.pdf
Need a strong biologistgeneticist to answer this P element question.pdf
arjuncorner565
 
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdfModify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
arjuncorner565
 
Listed are 2 of the core theories of evolution. For each, give a def.pdf
Listed are 2 of the core theories of evolution. For each, give a def.pdfListed are 2 of the core theories of evolution. For each, give a def.pdf
Listed are 2 of the core theories of evolution. For each, give a def.pdf
arjuncorner565
 

More from arjuncorner565 (20)

Write about Participatory Design Issues and Concerns (use your own.pdf
Write about Participatory Design Issues and Concerns (use your own.pdfWrite about Participatory Design Issues and Concerns (use your own.pdf
Write about Participatory Design Issues and Concerns (use your own.pdf
 
Why do some vertebrates, like a hellbender salamander, exchange oxyg.pdf
Why do some vertebrates, like a hellbender salamander, exchange oxyg.pdfWhy do some vertebrates, like a hellbender salamander, exchange oxyg.pdf
Why do some vertebrates, like a hellbender salamander, exchange oxyg.pdf
 
Which of the following is the most direct source of energy for cotran.pdf
Which of the following is the most direct source of energy for cotran.pdfWhich of the following is the most direct source of energy for cotran.pdf
Which of the following is the most direct source of energy for cotran.pdf
 
Which minerals commonly show pleochroisma. Isometric minerals.pdf
Which minerals commonly show pleochroisma. Isometric minerals.pdfWhich minerals commonly show pleochroisma. Isometric minerals.pdf
Which minerals commonly show pleochroisma. Isometric minerals.pdf
 
Two cards are drawn from a standard deck of cards. Determine the pro.pdf
Two cards are drawn from a standard deck of cards. Determine the pro.pdfTwo cards are drawn from a standard deck of cards. Determine the pro.pdf
Two cards are drawn from a standard deck of cards. Determine the pro.pdf
 
The probability that a student will find a (desirable) job before gr.pdf
The probability that a student will find a (desirable) job before gr.pdfThe probability that a student will find a (desirable) job before gr.pdf
The probability that a student will find a (desirable) job before gr.pdf
 
The Northern Pacific Railroad actively lobbied for which of the foll.pdf
The Northern Pacific Railroad actively lobbied for which of the foll.pdfThe Northern Pacific Railroad actively lobbied for which of the foll.pdf
The Northern Pacific Railroad actively lobbied for which of the foll.pdf
 
The difference between vertical and horizontal transmission of plant .pdf
The difference between vertical and horizontal transmission of plant .pdfThe difference between vertical and horizontal transmission of plant .pdf
The difference between vertical and horizontal transmission of plant .pdf
 
select all that apply to ground substanceSolutionLets us see w.pdf
select all that apply to ground substanceSolutionLets us see w.pdfselect all that apply to ground substanceSolutionLets us see w.pdf
select all that apply to ground substanceSolutionLets us see w.pdf
 
Relying on the above pathway for biosynthesis of tryptophan, fill i.pdf
Relying on the above pathway for biosynthesis of tryptophan, fill i.pdfRelying on the above pathway for biosynthesis of tryptophan, fill i.pdf
Relying on the above pathway for biosynthesis of tryptophan, fill i.pdf
 
Question 7 (2 points)A researcher conducts a study on the realtion.pdf
Question 7 (2 points)A researcher conducts a study on the realtion.pdfQuestion 7 (2 points)A researcher conducts a study on the realtion.pdf
Question 7 (2 points)A researcher conducts a study on the realtion.pdf
 
Primary difference between the income sections for form 1120 and .pdf
Primary difference between the income sections for form 1120 and .pdfPrimary difference between the income sections for form 1120 and .pdf
Primary difference between the income sections for form 1120 and .pdf
 
Once its readable i will be okay.SolutionI will be okay in.pdf
Once its readable i will be okay.SolutionI will be okay in.pdfOnce its readable i will be okay.SolutionI will be okay in.pdf
Once its readable i will be okay.SolutionI will be okay in.pdf
 
Need a strong biologistgeneticist to answer this P element question.pdf
Need a strong biologistgeneticist to answer this P element question.pdfNeed a strong biologistgeneticist to answer this P element question.pdf
Need a strong biologistgeneticist to answer this P element question.pdf
 
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdfModify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
Modify HuffmanTree.java and HuffmanNode.java to allow the user to se.pdf
 
Listed are 2 of the core theories of evolution. For each, give a def.pdf
Listed are 2 of the core theories of evolution. For each, give a def.pdfListed are 2 of the core theories of evolution. For each, give a def.pdf
Listed are 2 of the core theories of evolution. For each, give a def.pdf
 
Light is confined within the core of a simple clad optical fiber by.pdf
Light is confined within the core of a simple clad optical fiber by.pdfLight is confined within the core of a simple clad optical fiber by.pdf
Light is confined within the core of a simple clad optical fiber by.pdf
 
Let L R^n rightarrow R^m be a linear transformation. Show that if n .pdf
Let L R^n rightarrow R^m be a linear transformation. Show that if n .pdfLet L R^n rightarrow R^m be a linear transformation. Show that if n .pdf
Let L R^n rightarrow R^m be a linear transformation. Show that if n .pdf
 
IS path vector routing algorithm closer to the distance vector rou.pdf
IS path vector routing algorithm closer to the distance vector rou.pdfIS path vector routing algorithm closer to the distance vector rou.pdf
IS path vector routing algorithm closer to the distance vector rou.pdf
 
a growth medium that can determine if a bacterium contains several d.pdf
a growth medium that can determine if a bacterium contains several d.pdfa growth medium that can determine if a bacterium contains several d.pdf
a growth medium that can determine if a bacterium contains several d.pdf
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 

Need the mutiple choice answered uslde .An)_can omunicate with a sys.pdf

  • 1. Need the mutiple choice answered uslde .An)_can omunicate with a system inside a firewall system to be used to filter out undesirable traffic and prevent employees from accessing potentially hostile web sites Multiple-Choice Quiz e three types of event logs generated What are the three t t bw Windows Which of the following is not a capability of 6. Windows 2003 and Vista by A. Event, Process, and Security B. Application, User, and Security c. User, Event, and Security network-based IDS A. Can detect denial-of-service attacks B. Can decrypt and read encrypted traffic C. Can decode UDP and TCP packets D. Can be tuned to a particular network Application, System, and Security What are the two main types of intrusion detection systems? A. Network-based and host-based B. Signature-based and event-based C. Active and reactive D. Intelligent and passive environment An active IDS can: A. Respond to attacks with TCP resets B. Monitor for malicious activity C. A and B D. None of the above Honeypots are used to: , 7. s. What was the first commercial, network-based 8. IDS product? A. Stalker B. NetRanger C. IDES D. RealSecure What are the two main types of IDS signatures? 9. Egress filtering is used to detect spam that is: A. Network-based and file-based B. Context-based and content-based C Active and reactive A. Attract attackers by simulating systems with open network services B. Monitor network usage by employees C. Process alarms from other IDSs D. Attract customers to e-commerce sites A. Coming into an organization B. Sent from known spammers outside your organization C. Leaving an organization D. Sent to mailing lists in your organization Preventative intrusion detection systems: A. Are cheaper B. D. None of the above . Which of the following describes a passive, host based IDS? 10. A. Runs on the local system Are designed to stop malicious activity from occurring B. Does not C. Can l D. All of the above not interact with the traffic around it C. Can only monitor activity D. Were the first types of IDS ook at system event and error logs r 13:Indusion Detection Systems Detection Systems and Network Security Solution 1. What are the three types of event logs generated by Windows 2003 and Vista systems? D. Application, System, and Security 2. What are the two main types of intrusion detection systems? A. Network-based and host-based 3. What was the first commercial, network-based IDS product? B. NetRanger 4. What are the two main types of IDS signatures? B. Context-based and content-based 5. Which of the following describes a passive, host-based IDS?
  • 2. D. All of the above 6. Which of the following is not a capability of network-based IDS? B. Can decrypt and read encrypted traffic 7. An active IDS can: C. A and B 8. Honeypots are used to: A. Attract attackers by simulating systems with open network services 9. Egress filtering is used to detect spam that is: C. Leaving an organization 10. Preventative intrusion detection systems: B. Are designed to stop malicious activity from occurring