Which of these indicates the primary purpose of an intrusion
detection system
a) Detect abnormal activity c)
Rate system performance
b) Diagnose system failures d)
Test a system for vulnerabilities
a)To detect abnormal activies.
Intrusion detection's primary purpose is to know the violation of the system from its normal working that is abnormal activities.
Which of these indicates the primary purpose of an intrusion detection system a) Detect abnormal activity ...
What is the difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS)? a. There is no difference; a NIDS and a NIPS are equal. b. A NIPS can take actions more quickly to combat an attack. c. A NIDS provides more valuable information about attacks. d. A NIPS is much slower because it uses protocol analysis.
Using a statistical intrusion detection system, we want a system with a very high true positive rate and a very low ______ rate. (Fill in the blank) A. false-positive B. rule-based C. true-negative D. base E. false-negative
3.54!
3.54 Intrusion detection systems. Refer to the Journal of Research of the National Institute of Standards and Technology (Nov.-Dec. 2003) study of a double intrusion detection system with independent systems, Exercise 3.39 (p. 106). Recall that if there is an intruder, system A sounds an alarm with probability 9 and system B sounds an alarm with probability .95. If there is no intruder, system A sounds an alarm with probability .2 and system B sounds an alarm with probability...
Web and Data Security Which of the following is NOT a primary detection methodology? a. signature detection b. anomaly detection c. baseline detection d. stateful protocol analysis
The security administrator for a large organization receives numerous alerts from a network-based intrusion detection system (NIDS) of a possible worm infection spreading through the network via network shares. Before taking any drastic action to solve this problem such as blocking file sharing, what should first be done? A. Perform a pilot study of the solution and monitor for adverse affects Look for a less radical solution B. Call an emergency change management meeting to ensure the solution will not...
1- Which of the following is NOT a basic type of fire detection system? A Photoelectric detection sensors B Fixed-temperature C Rate-of-rise sensors D Thermal detection 2 .-Which of the following delivers documented instructions to the individuals who are executing the implementation phase? A resources B project plan C project scope D milestone
is/are an example of a detective control. 7) A) Physical access controls B) Encryption C) Emergency response teanms D) Log analysis of both 8) COBIT S management practice APO01.08 stresses the importance of employee compliance with the organization's information security policies and overall performance of business processes A) continuous improvement of B) continuous reviewing C) continuous monitoring D) continuous auditing 9) Which of the following is not a requirement of effective passwords? A) Passwords should be changed at regular intervals...
10 Which of the following BEST defines hackers? O A i Indviduals who use their technical computing and ps O B. indrviduals who use their technical C. individuals that use their computing resources in order to create vulnerabilities in computer prograns QUESTION 11 intrusion Detection Systems are able to detect unauthorized system O B. Accessing systems leave traces that are not easily removed QUESTION 12 several of s older i This is an example of outsourcing for the purpose of...
What is the primary purpose of performance reviews? a. to clarify what is important to the organization b. to improve future performance c. to link performance and compensation d. to make employees fully aware of their current performance
Detection risk for a test of details includes which of the following? I. Inherent risk II. The risk that the auditor will not detect a misstatement III. Control risk A. I and II only. B. I and III only. C. II only. D. I, II, and III.