Q1
More vulnerable to network security evasion techniques enabled by various network attack methods
Options:
A) IDS
B) IPS
Answer: A) IDS
1/10
| Term | Definition |
|---|---|
Q1
More vulnerable to network security evasion techniques enabled by various network attack methods
Options:
A) IDS
B) IPS
| Answer: A) IDS |
Q2
Can affect network performance by introducing latency and jitter
Options:
A) IDS
B) IPS | Answer: B) IPS |
Q3
Must be implemented so that time-sensitive applications are not adversely affected
Options:
A) IDS
B) IPS
|
Answer: B) IPS |
Q4
Cannot stop the trigger packet and is not guaranteed to stop a connection
Options:
A) IDS
B) IPS | Answer: A) IDS |
Q5
Deployed in offline mode
Options:
A) IDS
B) IPS | Answer: A) IDS |
Q6
Can use stream normalization techniques to reduce or eliminate many of the network security evasion capabilities that exist
Options:
A) IDS
B) IPS | Answer: B) IPS |
Q7
Can be configured to perform a packet drop to stop the trigger packet
Options:
A) IDS
B) IPS | Answer: B) IPS |
Q8
Primarily focused on identifying possible incidents, logging information about the incidents, and reporting the incidents
Options:
A) IDS
B) IPS | Answer: A) IDS |
Q9
Must be deployed inline, and traffic must be able to pass through it
Options:
A) IDS
B) IPS | Answer: B) IPS |
Q10
Less helpful in stopping email viruses and automated attacks, such as worms
Options:
A) IDS
B) IPS | Answer: A) IDS |