ALL PRINTABLE PDF BOOKS FREE DOWNLOAD <<CLICK HERE>>
Operating system mcqs security intrusion detection


Question 1 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the major components of the intrusion detection system?
Analysis Engine | |
Event provider | |
Alert Database | |
All of the mentioned |
Question 2 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the drawbacks of the host based IDS?
Unselective logging of messages may increase the audit burdens | |
Selective logging runs the risk of missed attacks | |
They are very fast to detect | |
They have to be programmed for new patterns |
Question 3 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are strengths of Network based IDS?
Cost of ownership reduced | |
Malicious intent detection | |
Real time detection and response | |
All of the mentioned |
Question 4 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What are the characteristics of signature based IDS?
Most are based on simple pattern matching algorithms | |
It is programmed to interpret a certain series of packets | |
It models the normal usage of network as a noise characterization | |
Anything distinct from the noise is assumed to be intrusion activity |
Question 5 [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER] |
What is the major drawback of anomaly detection IDS?
These are very slow at detection | |
It generates many false alarms | |
It doesn't detect novel attacks | |
None of the mentioned |
There are 5 questions to complete.