Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Security Systems Ch7


__ __ __ __ - __ __ __ __ __ __ __ __ __
Category: Question

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: chels2407
Popular Computers sets

 

 


Host-based IDPSAnswer: - resides on a particular computer or server, known as the host, and monitors activity only on that system20false
characters- private word or combination of _____ that only the user should know31true
systemIntrusion detection/prevention _____ (IDPS)40true
attacking– can detect an intrusion, and also prevent that intrusion from successfully _____ the organization by means of an active response51true
False reject rate-Answer: the percentage of identification instances in which authorized users are denied access a result of a failure in the biometric device60false
overwhelmtypically intended for network perimeter use, so they would be deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could _____ the firewall71true
FootprintingAnswer: - the organized research of the Internet addresses owned or controlled by a target organization80false
rejections)- the level at which the number of false _____ equals the false acceptances, and is also known as the equal error rate91true
Clipping level-Answer: as detected by an intrusion detection prevention system, the level of network activity that is established as a baseline and therefore activity volumes above that level are considered suspect100false
Virtual passwordAnswer: - a password calculated or extracted from a passphrase that meets system storage requirements120false
activityprocess of comparing predetermined profiles of generally accepted definitions of benign _____ for each protocol state against observed events to identify deviations131true
cannot- honey pot that has been protected so that it _____ be easily compromised141true
serverone that listens in on the network and determines vulnerable versions of both _____ and client software151true
Enticement-Answer: process of attracting attention to a system by placing tantalizing information in key locations160false
Monitoring portAnswer: - specially configured connection on a network device that is capable of viewing all of the traffic that moves through the entire device170false
instead- contains a computer chip that can verify and validate a number of pieces of information _____ of just a PIN181true
Synchronous tokensAnswer: - synchronized with a server, both devices use the same time or a time-based database to generate a number that is displayed and entered during the user login phase190false
networkresides on a computer or appliance connected to a segment of an organization’s network and monitors _____ traffic on that network segment, looking for indications of ongoing or successful attacks201true
Back hack-Answer: hack into a hacker’s system to find out as much as possible about the hacker210false
Attack protocolAnswer: - a series of steps or processes used by an attacker in a logical sequence to launch an attack against a target system or network240false