Need the mutiple choice answered uslde .An)_can omunicate with a system inside a firewall system to be used to filter out undesirable traffic and prevent employees from accessing potentially hostile web sites Multiple-Choice Quiz e three types of event logs generated What are the three t t bw Windows Which of the following is not a capability of 6. Windows 2003 and Vista by A. Event, Process, and Security B. Application, User, and Security c. User, Event, and Security network-based IDS A. Can detect denial-of-service attacks B. Can decrypt and read encrypted traffic C. Can decode UDP and TCP packets D. Can be tuned to a particular network Application, System, and Security What are the two main types of intrusion detection systems? A. Network-based and host-based B. Signature-based and event-based C. Active and reactive D. Intelligent and passive environment An active IDS can: A. Respond to attacks with TCP resets B. Monitor for malicious activity C. A and B D. None of the above Honeypots are used to: , 7. s. What was the first commercial, network-based 8. IDS product? A. Stalker B. NetRanger C. IDES D. RealSecure What are the two main types of IDS signatures? 9. Egress filtering is used to detect spam that is: A. Network-based and file-based B. Context-based and content-based C Active and reactive A. Attract attackers by simulating systems with open network services B. Monitor network usage by employees C. Process alarms from other IDSs D. Attract customers to e-commerce sites A. Coming into an organization B. Sent from known spammers outside your organization C. Leaving an organization D. Sent to mailing lists in your organization Preventative intrusion detection systems: A. Are cheaper B. D. None of the above . Which of the following describes a passive, host based IDS? 10. A. Runs on the local system Are designed to stop malicious activity from occurring B. Does not C. Can l D. All of the above not interact with the traffic around it C. Can only monitor activity D. Were the first types of IDS ook at system event and error logs r 13:Indusion Detection Systems Detection Systems and Network Security Solution 1. What are the three types of event logs generated by Windows 2003 and Vista systems? D. Application, System, and Security 2. What are the two main types of intrusion detection systems? A. Network-based and host-based 3. What was the first commercial, network-based IDS product? B. NetRanger 4. What are the two main types of IDS signatures? B. Context-based and content-based 5. Which of the following describes a passive, host-based IDS? D. All of the above 6. Which of the following is not a capability of network-based IDS? B. Can decrypt and read encrypted traffic 7. An active IDS can: C. A and B 8. Honeypots are used to: A. Attract attackers by simulating systems with open network services 9. Egress filtering is used to detect spam that is: C. Leaving an organization 10. Preventative intrusion detection systems: B. Are designed to stop m.