Discuss, Learn and be Happy דיון בשאלות

help brightness_4 brightness_7 format_textdirection_r_to_l format_textdirection_l_to_r

What is NOT a basic component of an IDS?

1
done
There are three basic components of an IDS: a sensor, analyzer, and user (security administrator) interface.
by
מיין לפי
by Barak Menachem
Barak Menachem 0 נקודות · יותר מ-6 חודשים
מוניטין: 1
ניראלי זה טעות, התשובה צריכה להיות UI, לא?
by

What does a host-based IDS use for analysis?

1
done
The agent scrutinizes event logs, critical system files, and other auditable resources.
by
מיין לפי

An IDS does NOT use which of the following techniques for detecting intrusions?

1
done
Rule-based IDSs are characterized by their expert system properties that create rules to detect system status information.
by
מיין לפי
by Daniel Margalit
Daniel Margalit 1 נקודות · יותר מ-6 חודשים
מוניטין: 500
Rule-based IDSs are characterized by their expert system properties that create rules to detect system status information.
by

Audit logs should record all of the following EXCEPT:

1
done
The audit data will reveal that a specific user accessed the file, the time of access, and the type of access.
by
מיין לפי

Clipping levels helps prevent:

1
done
Anything that occurs beyond the baseline would be considered worth reviewing in more detail.
by
מיין לפי

Audit logs should be protected for all of the reasons EXCEPT:

1
done
The audit trail data should be protected at the most sensitive system level.
by
מיין לפי

A penetration test is NOT designed to:

1
done
In addition to finding holes in the security measures, a penetration test can be initiated to test an intrusion detection system and intrusion response capability.
by
מיין לפי

Access control systems should consider all of the following EXCEPT:

1
done
It is important to balance the goals of the organization’s access control policy with the technical mechanisms. This includes reviewing the legal requirements that are necessary to protect access; conducting a risk analysis that identifies the typical threats to the system; reviewing accepted industry practices; identifying users who need access and what type of access they need; and identifying the sensitivity of the information stored and processed on the system.
by
מיין לפי

Business continuity addresses:

1
done
Business continuity addresses the availability leg of the security triad.
by
מיין לפי

Preparing a full-scale BCP can:

1
done
Preparing a full-scale BCP can take a long time.
by
מיין לפי