Take as many assements as you can to improve your validate your skill rating
Total Questions: 10
1. What are the different ways to intrude ?
Correct Answer is : All of the mentioned
2. What are major components of intrusion detection system ?
Correct Answer is : All of the mentioned
3. What are the different ways to classify an IDS ?
Correct Answer is : all of the mentioned
4. What are the different ways to classify an IDS ?
Correct Answer is : Host & Network based
5. What are characteristics of anomaly based IDS ?
Correct Answer is : It models the normal usage of network as a noise characterization
6. Which of the following is an advantage of anomaly detection?
Correct Answer is : The engine can scale as the rule set grows
7. A false positive can be defined as…
Correct Answer is : Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network
8. One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?
Correct Answer is : Inside the firewall
9. What is the purpose of a shadow honeypot?
Correct Answer is : To randomly check suspicious traffic identified by an anomaly detection system
10. At which two traffic layers do most commercial IDSes generate signatures?
Correct Answer is : both Transport layer and Network layer