You are configuring your new IDS machine, and are creating new rules. You enter the following rule: Alert tcp any any -> 10.0.10.0/24 any (msg: "SYN-FIN scan detected"; flags:SF;) What is the effect of this rule?
Answer : A
When performing wireless network traffic analysis, what is the type and subtype for an 802.11 authentication packet?
Answer : B
You have been hired at a large company to manage network. Prior to your arrival, there was no one dedicated to security, so you are starting at the beginning. You hold a meeting and are discussing the main functions and features of network security. One of your assistants asks what the function of Integrity in network security is. Which of the following best describes Integrity?
Answer : D
As Intrusion Detection Systems become more sophisticated, the software manufacturers develop different methods of detection. If an IDS uses the process of matching known attacks against data collected in your network, what is this known as?
Answer : A
After installing Snort on your Windows machine that is destined to be your IDS, you need to edit the configuration file to customize it to your needs. What is the name of that configuration file?
Answer : D
When using IPTables, the ability to specify all possible IP addresses in a rule is included; which of the following are correct syntax for specifying all possible IP addresses?
Answer : B, C
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm is indicating an intrusion when there is an actual intrusion?
Answer : C