Web and Data Security
Which of the following is NOT a primary detection methodology?
a. |
signature detection |
|
b. |
anomaly detection |
|
c. |
baseline detection |
|
d. |
stateful protocol analysis |
option c is correct answer since remaining options are related to security and they are used for detection but baseline detection is used when analyzing historical collection of different documents
Web and Data Security Which of the following is NOT a primary detection methodology? a. signature...
Which of the following is (are) NOT a level of Network Security Management methodology? a. Prevention. b. Detection. c. Analysis. d. Collection.
CYBERSECURITY AND INFORMATION ASSURANCE 16. Most IDSs can use both Signature-based detection and Anomaly-based detection methods simultaneously. a. True b. False 17. One drawback which Bejtlich points out about standard security process models, is that they represent the relationship between internal security steps and not a/an ________ process/steps. 18. The textbook lists three ways in which NSM consoles (e.g., Sguil, Squert, Snorby) specifically assist security analysts beyond other standard network tools. Which of the following is not one of those...
Web and Data Security Which of the following best describes a one-way function? a. generates secret keys from a secret value b. a bit string that prevents generation of the same ciphertext c. random bits used as input for key derivation functions d. easy to compute but difficult and time consuming to reverse
A security engineer wants to add SSL to the public web server. Which of the following would be
A. Download the web certificateB. Install the intermediate certificateC. Generate a CSRD. Encrypt the private key
A security engineer wants to add SSL to the public web server. Which of the following would be the On Download the web certificate Install the intermediate certificate. Generate a CSR. Encrypt the private key.
Which of these indicates the primary purpose of an intrusion detection system a) Detect abnormal activity c) Rate system performance b) Diagnose system failures d) Test a system for vulnerabilities
Which of the following describes how anomaly desection (used in IDSs and IPSs) works? Qton 15 Not ye anweed Pots ous of s.0 r lag question Select one: O a. Anomaly detection monitors the activitdies of computer users for signs of corporate espionage or O b. Anomaly detection monitors activities for deviations from normal behavior, which might indicate O c. Anomaly detection compares observed activities to a database of known attacks, watching for insider attacks that an attack is underway...
Which of the following is (are) TRUE about Network Security Management? a.It is a type of preventative measure against network-oriented attacks. b.It serves as an alternative measure to the Intrusion Detection/Prevention System. c.It is used to gain visibility into potential attacks with no signature. d.None of the above.
Question 33 Which of the following is the primary security feature of a proxy server? Content filtering Route Filtering URL blocking Route blocking Virus Detection Question 34 Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. A security technician was asked to prepare a report of files that had changed since last night's integrity scan. Which of the...
Web and Data Security What is a Basic Service Set? a. a group of wireless devices served by a single AP b. wireless devices set up as a basic ad-hoc network c. a wireless network that does not use an AP d. multiple APs are set up to provide some overlap
. Name the layer of the Web/Internet Protocol Stack with which each of these functions is associated. a. Encrypt a message. b. Prevent buffer overruns. c. Choose the best route for a data packet. d. Compose an email message.