1.
Who can best decide what are the adequate technical security controls in a computer-based application system in regards to the protection of the data being used, the criticality of the data, and it's sensitivity level ?
2.
Attributable data should be:
3.
Which of the following best describes signature-based detection?
4.
Which of the following is used to monitor network traffic or to monitor host audit logs in real time to determine violations of system security policy that have taken place?
5.
Which of the following monitors network traffic in real time?
6.
A host-based IDS is resident on which of the following?
7.
Which of the following usually provides reliable, real-time information without consuming network or host resources?
8.
The fact that a network-based IDS reviews packets payload and headers enable which of the following?
9.
Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?
10.
What would be considered the biggest drawback of Host-based Intrusion Detection systems (HIDS)?