Q1
More vulnerable to network security evasion techniques enabled by various network attack methods
Options:
A) IDS
B) IPS
Answer: A) IDS
1/10
| Term | Definition |
|---|---|
| Q1 More vulnerable to network security evasion techniques enabled by various network attack methods Options: A) IDS B) IPS | Answer: A) IDS |
| Q2 Can affect network performance by introducing latency and jitter Options: A) IDS B) IPS | Answer: B) IPS |
| Q3 Must be implemented so that time-sensitive applications are not adversely affected Options: A) IDS B) IPS | Answer: B) IPS |
| Q4 Cannot stop the trigger packet and is not guaranteed to stop a connection Options: A) IDS B) IPS | Answer: A) IDS |
| Q5 Deployed in offline mode Options: A) IDS B) IPS | Answer: A) IDS |
| Q6 Can use stream normalization techniques to reduce or eliminate many of the network security evasion capabilities that exist Options: A) IDS B) IPS | Answer: B) IPS |
| Q7 Can be configured to perform a packet drop to stop the trigger packet Options: A) IDS B) IPS | Answer: B) IPS |
| Q8 Primarily focused on identifying possible incidents, logging information about the incidents, and reporting the incidents Options: A) IDS B) IPS | Answer: A) IDS |
| Q9 Must be deployed inline, and traffic must be able to pass through it Options: A) IDS B) IPS | Answer: B) IPS |
| Q10 Less helpful in stopping email viruses and automated attacks, such as worms Options: A) IDS B) IPS | Answer: A) IDS |