MCQOPTIONS
 Saved Bookmarks
				This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Operating System Questions & Answers Security Intrusion Detection knowledge and support exam preparation. Choose a topic below to get started.
| 1. | 
                                    What are characteristics of Network based IDS? | 
                            
| A. | They look for attack signatures in network traffic | 
| B. | Filter decides which traffic will not be discarded or passed | 
| C. | It is programmed to interpret a certain series of packet | 
| D. | It models the normal usage of network as a noise characterization | 
| Answer» B. Filter decides which traffic will not be discarded or passed | |
| 2. | 
                                    What are characteristics of stack based IDS? | 
                            
| A. | They are integrated closely with the TCP/IP stack and watch packets | 
| B. | The host operating system logs in the audit information | 
| C. | It is programmed to interpret a certain series of packets | 
| D. | It models the normal usage of network as a noise characterization | 
| Answer» B. The host operating system logs in the audit information | |
| 3. | 
                                    What are the strengths of the host based IDS? | 
                            
| A. | Attack verification | 
| B. | System specific activity | 
| C. | No additional hardware required | 
| D. | All of the mentioned | 
| Answer» E. | |
| 4. | 
                                    What are the drawbacks of the host based IDS? | 
                            
| A. | Unselective logging of messages may increase the audit burdens | 
| B. | Selective logging runs the risk of missed attacks | 
| C. | They are very fast to detect | 
| D. | They have to be programmed for new patterns | 
| Answer» B. Selective logging runs the risk of missed attacks | |
| 5. | 
                                    What are the characteristics of Host based IDS? | 
                            
| A. | The host operating system logs in the audit information | 
| B. | Logs includes logins,file opens and program executions | 
| C. | Logs are analysed to detect tails of intrusion | 
| D. | All of the mentioned | 
| Answer» E. | |
| 6. | 
                                    What are the drawbacks of signature based IDS? | 
                            
| A. | They are unable to detect novel attacks | 
| B. | They suffer from false alarms | 
| C. | They have to be programmed again for every new pattern to be detected | 
| D. | All of the mentioned | 
| Answer» E. | |
| 7. | 
                                    What are the characteristics of signature based IDS? | 
                            
| A. | Most are based on simple pattern matching algorithms | 
| B. | It is programmed to interpret a certain series of packets | 
| C. | It models the normal usage of network as a noise characterization | 
| D. | Anything distinct from the noise is assumed to be intrusion activity | 
| Answer» B. It is programmed to interpret a certain series of packets | |
| 8. | 
                                    What is the major drawback of anomaly detection IDS? | 
                            
| A. | These are very slow at detection | 
| B. | It generates many false alarms | 
| C. | It doesn t detect novel attacks | 
| D. | None of the mentioned | 
| Answer» C. It doesn t detect novel attacks | |
| 9. | 
                                    What are the characteristics of anomaly based IDS? | 
                            
| A. | It models the normal usage of network as a noise characterization | 
| B. | It doesn t detect novel attacks | 
| C. | Anything distinct from the noise is not assumed to be intrusion activity | 
| D. | It detects based on signature | 
| Answer» B. It doesn t detect novel attacks | |
| 10. | 
                                    What are the different ways to classify an IDS? | 
                            
| A. | anomaly detection | 
| B. | signature based misuse | 
| C. | stack based | 
| D. | all of the mentioned | 
| Answer» E. | |
| 11. | 
                                    What are the major components of the intrusion detection system? | 
                            
| A. | Analysis Engine | 
| B. | Event provider | 
| C. | Alert Database | 
| D. | All of the mentioned | 
| Answer» E. | |
| 12. | 
                                    What are the different ways to intrude? | 
                            
| A. | Buffer overflows | 
| B. | Unexpected combinations and unhandled input | 
| C. | Race conditions | 
| D. | All of the mentioned | 
| Answer» E. | |