Quiz 4: IAS 323

Quiz 4: IAS 323

University

10 Qs

quiz-placeholder

Similar activities

Fuel User Group Member Quiz

Fuel User Group Member Quiz

University

10 Qs

Bảo Mật TMĐT

Bảo Mật TMĐT

University

10 Qs

esafas

esafas

University

9 Qs

AAPGuiz November 2022

AAPGuiz November 2022

University

10 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

CYS310 Chapter 9 Assessment

CYS310 Chapter 9 Assessment

University

15 Qs

Tower Heroes

Tower Heroes

KG - Professional Development

12 Qs

Post-Assessment Chapter 12

Post-Assessment Chapter 12

University

15 Qs

Quiz 4: IAS 323

Quiz 4: IAS 323

Assessment

Quiz

Other

University

Medium

Created by

Alvin Herrera

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It detects unauthorized access attempts on computers and generates warning alerts (via pager, e-mail, or SMS) or takes corrective actions.

Host Intrusion Detection Software

Host Intrusive Detection Software

Host Intrusion Detection System

Host Intrusive Detection System

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is an information assurance management system (IAMS) that detects inappropriate, incorrect, or anomalous activities.

Intrusive Detection System

Intrusion Detection System

Intrusive Detection Software

Intrusion Detection Software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is a computer system set up with intentional/known vulnerabilities. The main purpose is to study hackers’ behavior, motivation, strategy, and tools used.

Honeycumb

Honeypoot

Honeypuff

Honeypot

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It is software designed to break into or damage a computer system without the owner’s consent.

Adware

Spyware

Malware

Ransomware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It operates on a host to detect malicious activity upon that host.

Host IDS

Hose IDS

Server IDS

Main IDS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

It provide access control to log information and enable system administrators to trace attacks or suspicious activities.

Log Management Tools

Log Maintenance Tools

Log Management Toolkit

Log Maintenance Toolkit

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Computer program that can copy itself and infect a computer and cause harm.

Worm

Virus

Trojan Horse

Logic Bomb

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?