11.1.5 Check your understanding

Created by yabdelaziz

Q1 More vulnerable to network security evasion techniques enabled by various network attack methods Options: A) IDS B) IPS
Answer: A) IDS

1/10

TermDefinition
Q1 More vulnerable to network security evasion techniques enabled by various network attack methods Options: A) IDS B) IPS Answer: A) IDS
Q2 Can affect network performance by introducing latency and jitter Options: A) IDS B) IPSAnswer: B) IPS
Q3 Must be implemented so that time-sensitive applications are not adversely affected Options: A) IDS B) IPS Answer: B) IPS
Q4 Cannot stop the trigger packet and is not guaranteed to stop a connection Options: A) IDS B) IPSAnswer: A) IDS
Q5 Deployed in offline mode Options: A) IDS B) IPSAnswer: A) IDS
Q6 Can use stream normalization techniques to reduce or eliminate many of the network security evasion capabilities that exist Options: A) IDS B) IPSAnswer: B) IPS
Q7 Can be configured to perform a packet drop to stop the trigger packet Options: A) IDS B) IPSAnswer: B) IPS
Q8 Primarily focused on identifying possible incidents, logging information about the incidents, and reporting the incidents Options: A) IDS B) IPSAnswer: A) IDS
Q9 Must be deployed inline, and traffic must be able to pass through it Options: A) IDS B) IPSAnswer: B) IPS
Q10 Less helpful in stopping email viruses and automated attacks, such as worms Options: A) IDS B) IPSAnswer: A) IDS