Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 7

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
Intrusion   show
🗑
show devices that detect unauthorized activity within the inner network or an individual machine  
🗑
show – can detect an intrusion, and also prevent that intrusion from successfully attacking the organization by means of an active response  
🗑
show )- used to describe current anti-intrusion technologies  
🗑
Network-based IDPS (NIDPS)   show
🗑
Monitoring port   show
🗑
show a process in which a network-based intrusion detection prevention system looks for invalid data packets  
🗑
Application protocol verification-   show
🗑
show use same connection methods as network-based IDPS  
🗑
Inline sensors-   show
🗑
Host-based IDPS   show
🗑
show - benchmark and monitor the status of key system files and detect when an intruder creates, modifies, or deletes monitored files  
🗑
Signature-based IDPS (knowledge-based IDPS or misuse-detection IDPS)-   show
🗑
show - preconfigured, predetermined attack patterns  
🗑
Statistical anomaly-based IDPS (stat IDPS) or behavior-based IDPS-   show
🗑
show as detected by an intrusion detection prevention system, the level of network activity that is established as a baseline and therefore activity volumes above that level are considered suspect  
🗑
Stateful protocol analysis (SPA)   show
🗑
Log file monitor (LFM)-   show
🗑
show designed to trip the organization’s IDPS, essentially causing the organization to conduct its own  
🗑
show all IDPS control functions are implemented and managed in a central location  
🗑
Fully distributed IDPS control strategy   show
🗑
show an intrusion detection prevention system control strategy in which individual agents can still analyze and respond to local threats, but they are required to report to a hierarchical central facility which creates a blended approach that enables the organ  
🗑
show - decoy systems designed to lure potential attackers away from critical systems  
🗑
Honey net   show
🗑
Padded cell   show
🗑
Trap and trace   show
🗑
show hack into a hacker’s system to find out as much as possible about the hacker  
🗑
show process of attracting attention to a system by placing tantalizing information in key locations  
🗑
show the action of luring an individual into committing a crime to get a conviction  
🗑
Attack protocol   show
🗑
Footprinting   show
🗑
show systematic survey of all of the target organization’s Internet addresses  
🗑
Port scanners-   show
🗑
Active vulnerability scanners-   show
🗑
Passive vulnerability scanner-   show
🗑
Packet sniffer-   show
🗑
show security measures such as a badge reader that admits or prohibits people from entering sensitive areas  
🗑
Supplicants-   show
🗑
Strong authentication   show
🗑
show - private word or combination of characters that only the user should know  
🗑
show - a series of characters, typically longer than a password from which a virtual password is derived  
🗑
Virtual password   show
🗑
show - contains a computer chip that can verify and validate a number of pieces of information instead of just a PIN  
🗑
show - synchronized with a server, both devices use the same time or a time-based database to generate a number that is displayed and entered during the user login phase  
🗑
show - use a challenge response system- in which the server challenges the supplicant during login with a numerical sequence  
🗑
show unique points of reference that are digitized and stored in an encrypted format when the user’s system access credentials are created  
🗑
False reject rate-   show
🗑
False accept rate-   show
🗑
show )- the level at which the number of false rejections equals the false acceptances, and is also known as the equal error rate  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: chels2407
Popular Computers sets