What is a phishing attack and how is it commonly carried out?
What is a phishing attack and how is it commonly carried out?
What is the main difference between IDS and IPS?
What is the main difference between IDS and IPS?
What type of access control technology does Johnneed to implement?
John needs to be able to use an access control technology that enforces thefollowing rules; If the user is accessing the system between Monday and Friday andbetween 8 A.M. and 5 P.M., and if the user’s security clearance equals or dominatesthe object’s classification, and if the user has the necessary need to know, thenthe user can access the object. What type of access control technology does Johnneed to implement?
How does this affect the companys IDS?
John is moving his companys network from a traditional configuration to aswitched environment. How does this affect the companys IDS?
What is the relationship between an IDS event generator, sensor, and responsemodule?
What is the relationship between an IDS event generator, sensor, and responsemodule?
what does it mean to call a product or protocol stateful?
Some protocols and products are referred to as stateful. What does "state"actually mean and what does it mean to call a product or protocol stateful?
Which of the following isnot a characteristic of this type of security mechanism?
A rule-based IDS is a newer and more sophisticated IDS. Which of the following isnot a characteristic of this type of security mechanism?
What type of access control should Tom implement?
Tom’s company managers may be able to access an employee folder, but thereneeds to be detailed access control that indicates, for example, that they canaccess customers’ home addresses but not Social Security numbers. What type of access control should Tom implement?
Which of the following is a proper match for the type of IDS and the type ofattack it is best suited to uncove
Which of the following is a proper match for the type of IDS and the type ofattack it is best suited to uncover?
Which of the following outlines the possibilities of not doingthis activity properly?
George is responsible for setting and tuning the thresholds for his companysbehavior-based IDS. Which of the following outlines the possibilities of not doingthis activity properly?