4.11. Review Questions

  1. Which of the following can be used to monitor a network for unauthorized activity? (Choose two.)

    1. Network sniffer

    2. NIDS

    3. HIDS

    4. VPN

  2. You're the administrator for Acme Widgets. After attending a conference on buzzwords for management, your boss informs you that an IDS should be up and running on the network by the end of the week. Which of the following systems should be installed on a host to provide IDS capabilities?

    1. Network sniffer

    2. NIDS

    3. HIDS

    4. VPN

  3. Which of the following is an active response in an IDS?

    1. Sending an alert to a console

    2. Shunning

    3. Reconfiguring a router to block an IP address

    4. Making an entry in the security audit file

  4. A junior administrator bursts into your office with a report in his hand. He claims that he has found documentation ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.