4.12. Answers to Review Questions

  1. A, B. Network sniffers and NIDSs are used to monitor network traffic. Network sniffers are manually oriented, whereas an NIDS can be automated.

  2. C. A host-based IDS (HIDS) is installed on each host that needs IDS capabilities.

  3. C. Dynamically changing the system's configuration to protect the network or a system is an active response.

  4. A. By comparing attack signatures and audit trails, a misuse-detection IDS determines whether an attack is occurring.

  5. D. The analyzer function uses data sources from sensors to analyze and determine whether an attack is under way.

  6. B. The manager is the component that the operator uses to manage the IDS. The manager may be a graphical interface, a real-time traffic screen, or a command-line-driven environment.

  7. A. A honeypot is a system that is intended to be sacrificed in the name of knowledge. Honeypot systems allow investigators to evaluate and analyze the attack strategies used. Law enforcement agencies use honeypots to gather evidence for prosecution.

  8. A. Incident response is the process of determining the best method of dealing with a computer security incident.

  9. C. Entrapment is the process of encouraging an individual to perform an unlawful act that they wouldn't normally have performed.

  10. C. Wireless Application Protocol (WAP) is an open international standard for applications that use wireless communication.

  11. A. 802.11 operates on 2.4GHZ. This standard allows for bandwidths of 1Mbps or 2Mbps.

  12. C. Wi-Fi Protected Access 2 (WPA2) was intended to provide security that's equivalent to the security on a wired network and implements elements of the 802.11i standard.

  13. D. A site survey is the process of monitoring a wireless network using a computer, wireless controller, and analysis software. Site surveys are easily accomplished and hard to detect.

  14. A. IM users are highly susceptible to malicious code attacks such as worms, viruses, and Trojan horses. Ensure that IM users have up-to-date antivirus software installed.

  15. B. Scanning is the process of gathering data about your network configuration and determining which systems are live.

  16. A. Footprinting involves identifying your network and its security posture. Footprinting is done using multiple sources of information to determine what systems you may be using.

  17. D. When an event is detected when it is happening, is is said to be detected in Real time.

  18. A. Jamming is the process of intentionally disrupting communications in an IM session. Jamming is a loosely defined term, and it refers to any intentional disruption that isn't a DoS attack.

  19. A. Your user has just encountered an application-level DoS attack. This type of attack is common and isn't usually fatal, but it's very annoying. Your user should restart his system, verify that the website didn't transmit a virus, and stay away from broadcasted websites.

  20. A. An IDS will announce an event through an alert when suspicious activity is encountered.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.226.98.166