InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Specify Some Of The Leading Intrusion Detection Systems (ids) Products? |
|
Answer» Some leading Intrusion Detection Systems (IDS) Products are
Some leading Intrusion Detection Systems (IDS) Products are |
|
| 2. |
Difference Between Firewall And Intrusion Detection System? |
|
Answer» A FIREWALL is a HARDWARE and/or software which functions in a networked environment to block unauthorized access while permitting authorized communications. Firewall is a device and/or a sotware that stands between a local network and the Internet, and filters traffic that might be harmful. An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or HOST (HIDS) to detect and report intrusion attempts to the network. We can think a firewall as security personnel at the GATE and an IDS device is a security camera after the gate. A firewall can block connection, while a Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security ADMINISTRATOR. However an Intrusion Detection and Prevention System (IDPS) can block connections if it finds the connections is an intrusion attempt. A firewall is a hardware and/or software which functions in a networked environment to block unauthorized access while permitting authorized communications. Firewall is a device and/or a sotware that stands between a local network and the Internet, and filters traffic that might be harmful. An Intrusion Detection System (IDS) is a software or hardware device installed on the network (NIDS) or host (HIDS) to detect and report intrusion attempts to the network. We can think a firewall as security personnel at the gate and an IDS device is a security camera after the gate. A firewall can block connection, while a Intrusion Detection System (IDS) cannot block connection. An Intrusion Detection System (IDS) alert any intrusion attempts to the security administrator. However an Intrusion Detection and Prevention System (IDPS) can block connections if it finds the connections is an intrusion attempt. |
|
| 3. |
What Is A Smart Jack Used For? |
|
Answer» A smartjack is a TYPE of NID with capabilities BEYOND simple electrical connection, such as diagnostics. An optical network terminal (ONT) is a type of NID USED with fiber-to-the-premises APPLICATIONS. A smartjack is a type of NID with capabilities beyond simple electrical connection, such as diagnostics. An optical network terminal (ONT) is a type of NID used with fiber-to-the-premises applications. |
|
| 4. |
What Is A Network Based Ids? |
|
Answer» A network-based intrusion detection system (NIDS) is used to monitor and ANALYZE network traffic to protect a system from network-based THREATS. A NIDS READS all inbound packets and SEARCHES for any suspicious PATTERNS. A network-based intrusion detection system (NIDS) is used to monitor and analyze network traffic to protect a system from network-based threats. A NIDS reads all inbound packets and searches for any suspicious patterns. |
|
| 5. |
What Is A Nids? |
|
Answer» Host INTRUSION detection SYSTEMS (HIDS) and network intrusion detection systems (NIDS) are methods of SECURITY management for computers and networks. Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. |
|
| 6. |
What Is Meant By Intruders In Network Security? |
|
Answer» An INTRUDER is a person who attempts to gain unauthorized access to a system, to damage that system, or to DISTURB data on that system. In SUMMARY, this person attempts to violate SECURITY by interfering with system Availability, data Integrity or data CONFIDENTIALITY. An Intruder is a person who attempts to gain unauthorized access to a system, to damage that system, or to disturb data on that system. In summary, this person attempts to violate Security by interfering with system Availability, data Integrity or data Confidentiality. |
|
| 7. |
What Is A Network Intrusion? |
|
Answer» A NETWORK intrusion is any UNAUTHORIZED ACTIVITY on a computer network. DETECTING an intrusion depends on the defenders having a clear understanding of how attacks WORK. A network intrusion is any unauthorized activity on a computer network. Detecting an intrusion depends on the defenders having a clear understanding of how attacks work. |
|
| 8. |
What Are Attacks Detected By A Nids? |
|
Answer» Attacks detected by a NIDS:
Penetration Attacks : In penetration attack, an attacker gains an unauthorized control of a system, and can modify/alter system state, read files, etc. Generally such attacks exploit certain flaws in the software, which enables the attacker to install viruses, and malware in the system. The most common types of penetration attacks are:
Attacks detected by a NIDS: Penetration Attacks : In penetration attack, an attacker gains an unauthorized control of a system, and can modify/alter system state, read files, etc. Generally such attacks exploit certain flaws in the software, which enables the attacker to install viruses, and malware in the system. The most common types of penetration attacks are:
|
|
| 9. |
What Are The Types Of Attacks? |
|
Answer» Attack Types :
Attack Types : |
|
| 10. |
What Are The Limitations Of Nids? |
|
Answer» Limitations of NIDS :
Limitations of NIDS : |
|
| 11. |
What Are The Strengths Of Nids? |
|
Answer» NIDS can perform the following functions to enhance the security :
NIDS can perform the following functions to enhance the security :
|
|
| 12. |
Explain Anomaly-based Intrusion Detection System? |
|
Answer» An anomaly-based INTRUSION detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and CLASSIFYING it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to DETECT any type of misuse that FALLS out of normal system operation. An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. |
|
| 13. |
Explain Signature Based Nids? |
|
Answer» Signature based NIDS : Signature-based IDS refers to the detection of ATTACKS by looking for specific patterns, such as byte sequences in network traffic, or KNOWN malicious instruction sequences USED by malware. This TERMINOLOGY ORIGINATES from anti-virus software, which refers to these detected patterns as signatures.
Signature based NIDS : Signature-based IDS refers to the detection of attacks by looking for specific patterns, such as byte sequences in network traffic, or known malicious instruction sequences used by malware. This terminology originates from anti-virus software, which refers to these detected patterns as signatures. |
|
| 14. |
What Are The Types Of Nids? |
|
Answer» Signature Based IDS : Compares INCOMING packets with known signatures. E.g. Snort, BRO, Suricata, etc. ANOMALY Detection SYSTEMS : Learns the normal behavior of the system.Generates ALERTS on packets that are different from the normal behavior. Signature Based IDS : Compares incoming packets with known signatures. E.g. Snort, Bro, Suricata, etc. Anomaly Detection Systems : Learns the normal behavior of the system.Generates alerts on packets that are different from the normal behavior. |
|
| 15. |
What Are The Types Of Ids? |
|
Answer» Types of IDS : Host BASED IDS :
NETWORK IDS (NIDS) :
Types of IDS : Host Based IDS : Network IDS (NIDS) : |
|
| 16. |
What Do Ids Detect? |
| Answer» | |
| 17. |
Explain Physical (physical Ids)? |
|
Answer» PHYSICAL (Physical IDS) : Physical intrusion detection is the act of identifying threats to physical systems. Physical intrusion detection is most often seen as physical controls put in place to ENSURE CIA. In MANY cases physical intrusion detection systems act as prevention systems as well. Examples of Physical intrusion detections are:
Physical (Physical IDS) : Physical intrusion detection is the act of identifying threats to physical systems. Physical intrusion detection is most often seen as physical controls put in place to ensure CIA. In many cases physical intrusion detection systems act as prevention systems as well. Examples of Physical intrusion detections are: |
|
| 18. |
Explain Host Based (hids)? |
|
Answer» Host Based (HIDS) : Often referred to as HIDS, host based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific DEVICE. HIDS generally INVOLVES an agent installed on each system, monitoring and alerting on local OS and application activity. The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity. The ROLE of a host IDS is passive, only gathering, identifying, logging, and alerting. Examples of HIDS:
Host Based (HIDS) : Often referred to as HIDS, host based intrusion detection attempts to identify unauthorized, illicit, and anomalous behavior on a specific device. HIDS generally involves an agent installed on each system, monitoring and alerting on local OS and application activity. The installed agent uses a combination of signatures, rules, and heuristics to identify unauthorized activity. The role of a host IDS is passive, only gathering, identifying, logging, and alerting. Examples of HIDS: |
|
| 19. |
What Is Ids In Networking? |
|
Answer» An intrusion detection system (IDS) INSPECTS all inbound and outbound network activity and IDENTIFIES suspicious patterns that may indicate a network or system attack from someone ATTEMPTING to break into or COMPROMISE a system. An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. |
|
| 20. |
What Are The Functions Of Intrusion Detection? |
|
Answer» Intrusion detection FUNCTIONS include:
Intrusion detection functions include: |
|
| 21. |
What Is Ips And Ids? |
|
Answer» If an IPS is a control tool, then an IDS is a visibility tool. INTRUSION Detection Systems sit off to the side of the network, MONITORING traffic at many different points, and PROVIDE visibility into the SECURITY posture of the network. If an IPS is a control tool, then an IDS is a visibility tool. Intrusion Detection Systems sit off to the side of the network, monitoring traffic at many different points, and provide visibility into the security posture of the network. |
|
| 22. |
What Is An Intrusion Detection System? |
|
Answer» An intrusion DETECTION system (IDS) is a device or software application that MONITORS a network or systems for malicious activity or policy violations. The most COMMON CLASSIFICATIONS are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. The most common classifications are network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS). |
|