Network Security Essentials Applications and Standards 5th Edition By Willaim Stallings – Test Bank
CHAPTER 11: INTRUDERS
TRUE OR FALSE
T F 1. Unauthorized intrusion into a computer system or network is one
of the most serious threats to computer security.
T F 2. Trojan horses and viruses are confined to network based attacks.
T F 3.
Intrusion detection involves detecting unusual patterns of activity
or patterns of activity that are known to correlate with intrusions.
T F 4. Statistical approaches attempt to define proper behavior and rule-
based approaches attempt to define normal or expected behavior.
T F 5.
The main advantage of the use of statistical profiles is that a prior
knowledge of security flaws is not required.
T F 6. One important element of intrusion prevention is password
T F 7. The ID determines the privileges accorded to the user.
T F 8. Insider attacks are among the easiest to detect and prevent.
T F 9. The hacking community is a strong meritocracy in which status is
determined by level of competency.
T F 10.
Penetration identification is an approach developed to detect
deviation from previous usage patterns.
T F 11. A weakness of the IDES approach is its lack of flexibility.
T F 12. To be of practical use an intrusion detection system should detect
a substantial percentage of intrusions while keeping the false
alarm rate at an acceptable level.
T F 13.
System administrators can stop all attacks and hackers from
penetrating their systems by installing software patches
T F 14. Password crackers rely on the fact that some people choose easily
T F 15.
Traditional hackers usually have specific targets, or at least
classes of targets in mind.
TRUE OR FALSE