BBAIT Advanced Network Security Quiz 2
BBAIT Advanced Network Security Quiz 2
Question 2
Of the following choices, what represents the best choice for a system to detect
attacks on a network, but not block them?
Question 3
In an IP packet header, the ____ is the address of the computer or device that is
to receive the packet
Question 4
What are the strengths of Host based IDS? (Choose three)
Question 5
What is a major drawback of anomaly detection IDS?
Question 6
What are characteristics of signature based IDS? (choose two)
Question 7
Of the following choices, what can you use to divert malicious attacks on your
network away from valuable resources to relatively worthless resources?
Response: Honeypot
Question 9
Your network has several critical servers that are accessible from the Internet.
The servers have been the targets of attackers in the past. You want to keep the
attackers away from your actual network but still want to monitor their activities.
How can you accomplish this?
Question 10
What are the drawbacks of signature based IDS? (Choose three)
Response: They have to be programmed again for every new pattern to be detected
Question 11
Of the following choices, what would detect compromises on a local server?
Question 12
What are the strengths of Network based IDS? (Choose three)
Question 13
Of the following choices, what most accurately describes a Network-based Intrusion
Prevention System?
Question 14
What is the difference between an intrusion detection system and an intrusion
prevention system?
Response: An IDS automates the intrusion detection process, while an IPS can detect
and also attempt to stop possible incidents
Question 15
When discussing IDPS, what is a signature?
Question 16
Which of the following is true of signature-based IDPSes?
Response: They can scan network traffic or packets to identify matches with attack-
definition files
Question 17
Which of the following is an advantage of anomaly detection?
Question 18
What does DHCP stand for?
Question 19
Your organization is using a Network-based Intrusion Detection System (NIDS). The
Network-based Intrusion Detection System vendor regularly provides updates for the
NIDS to detect known attacks. What type of NIDS is this?
Response: Prevention-based
Score: Signature-based
Question 20
An IDPS follows a two-step process consisting of a passive component and an active
component. Which of the following is part of the active component?
Score: Mechanisms put in place to reenact known methods of attack and record system
responses
Question 21
A false positive can be defined as ____ (Choose two)
Response: An alert that indicates nefarious activity on a system that, upon further
inspection, turns out to represent legitimate network traffic or behaviour
Score: An alert that indicates nefarious activity on a system that turns out to
represent malicious traffic or behaviour
Question 22
What can an administrator use to detect malicious activity after it occurred?
Response: IDPS
Question 23
One of the most obvious places to put an IDS sensor is near the firewall. Where
exactly in relation to the firewall is the most productive placement?
Question 24
What are the characteristics of Network based IDS? (Choose two)
Question 25
An organization wants to prevent SQL and script injection attacks on its Internet
web application. The organization should implement a(n):
Question 26
Of the following choices, what best describes the function of an Intrusion
Prevention System?
Question 27
In the intrusion detection context, what is a threshold?
Response: A value that sets the limit between normal and abnormal behaviour
Question 28
At which two traffic layers do most commercial IDPSes generate signatures? (Choose
two)
Question 29
What does NFAT stand for?
Question 30
What are the different ways to classify an IDS? (Choose two)
Question 31
You have installed an intrusion detection system on one of the production servers
to monitor malicious activities of applications and users only on that server. What
kind of IDS is this?
Question 32
What are the drawbacks of Host based IDS? (Choose two)
Question 33
What are characteristics of anomaly based IDS? (Choose two)
Question 34
What is the purpose of a shadow honeypot?
Question 35
You are preparing to deploy an anomaly-based detection system to monitor network
activity. What would you create first?
Response: Baseline
Score: 1 out of 1