CHAPTER 11: INTRUDERS
TRUE OR FALSE
T F 1. Unauthorized intrusion into a computer system or network is one
of the most serious threats to computer security.
T F 2. Trojan horses and viruses are confined to network based attacks.
T F 3.
Intrusion detection involves detecting unusual patterns of activity
or patterns of activity that are known to correlate with intrusions.
T F 4. Statistical approaches attempt to define proper behavior and rule-
based approaches attempt to define normal or expected behavior.
T F 5.
The main advantage of the use of statistical profiles is that a prior
knowledge of security flaws is not required.
T F 6. One important element of intrusion prevention is password
management.
T F 7. The ID determines the privileges accorded to the user.
T F 8. Insider attacks are among the easiest to detect and prevent.
T F 9. The hacking community is a strong meritocracy in which status is
determined by level of competency.
T F 10.
Penetration identification is an approach developed to detect
deviation from previous usage patterns.
T F 11. A weakness of the IDES approach is its lack of flexibility.
T F 12. To be of practical use an intrusion detection system should detect
a substantial percentage of intrusions while keeping the false
alarm rate at an acceptable level.
T F 13.
System administrators can stop all attacks and hackers from
penetrating their systems by installing software patches
periodically.
T F 14. Password crackers rely on the fact that some people choose easily
guessable passwords.
T F 15.
Traditional hackers usually have specific targets, or at least
classes of targets in mind.
TRUE OR FALSE
1. T
2. F
3. T
4. F
5. T
6. T
7. T
8. F
9. T
10. F
11. T
12. T
13. F
14. T
15. F
Reviews
There are no reviews yet.