Question
1. What common security system is an IDPS most like? In whatways are these systems similar? 2. How does a false positive alarm differ from
1. What common security system is an IDPS most like? In whatways are these systems similar?
2. How does a false positive alarm differ from a false negativeone? From a security perspective, which is least desirable?
3. How does a network-based IDPS differ from a host-basedIDPS?
4. How does a signature-based IDPS differ from a behavior-basedIDPS?
5. What is a monitoring (or SPAN) port? What is it used for?
6. List and describe the three control strategies proposed forIDPS control.
7. What is a honeypot? How is it different from a honeynet?
8. How does a padded cell system differ from a honeypot?
9. What is network footprinting? What is network fingerprinting?How are they related?
10. Why do many organizations ban port scanning activities ontheir internal networks?
Why would ISPs ban outbound port scanning by theircustomers?
11. What is an open port? Why is it important to limit thenumber of open ports to only those that are absolutelyessential?
12. What is a vulnerability scanner? How is it used to improvesecurity?
13. What is the difference between active and passivevulnerability scanners?
14. What kind of data and information can be found using apacket sniffer?
15. What capabilities should a wireless security toolkitinclude?
16. What is biometric authentication? What does the termbiometric mean?
17. Are any biometric recognition characteristics consideredmore reliable than others?
Which are the most reliable?
18. What is a false reject rate? What is a false accept rate?What is their relationship to the crossover error rate?
19. What is the most widely accepted biometric authorizationtechnology? Why do you think this technology is acceptable tousers?
20. What is the most effective biometric authorizationtechnology? Why do you think this technology is deemed to be mosteffective by security professionals?
Step by Step Solution
3.54 Rating (164 Votes )
There are 3 Steps involved in it
Step: 1
Answer 1 An IDPS is most commonly compared to a burglar alarm system as they both rely on sensors to detect intrusions and then alert the appropriate authorities Both systems are similar in that they ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started