1.
What IDS approach relies on a database of known attacks?
2.
Which of the following is most likely to be useful in detecting intrusions?
3.
Which conceptual approach to intrusion detection system is the most common?
4.
Several analysis methods can be employed by an IDS, each with its own strengths and weaknesses, and their applicability to any given situation should be carefully considered. There are two basic IDS analysis methods that exists. Which of the basic method is more prone to false positive?
5.
In order to enable users to perform tasks and duties without having to go through extra steps it is important that the security controls and mechanisms that are in place have a degree of?
6.
Which of the following is required in order to provide accountability?
7.
The viewing of recorded events after the fact using a closed-circuit TV camera is considered a
8.
Controls provide accountability for individuals who are accessing sensitive information. This accountability is accomplished:
9.
Why would anomaly detection IDSs often generate a large number of false positives?
10.
What is the essential difference between a self-audit and an independent audit?