CIS 359 STUDY Great Stories/cis359study.com CIS 359 STUDY Great Stories/cis359study.com | Page 46
46. The ____ approach for detecting intrusions is based on the
frequency with which certain network activities take place.
47. A(n) ____ , a type of IDPS that is similar to the NIDPS, reviews the
log files generated by servers, network devices, and even other IDPSs.
48. ____ are closely monitored network decoys serving that can distract
adversaries from more valuable machines on a network; can provide
early warning about new attack and exploitation trends; and can allow
in-depth examination of adversaries during and after exploitation.
49. In an attack known as ____, valid protocol packets exploit poorly
configured DNS servers to inject false information to corrupt the
servers’ answers to routine DNS queries from other systems on that
network.
50. A(n) ____ is the set of rules and configuration guidelines governing
the implementation and operation of IDPSs within the organization.
===================================================
CIS 359 Midterm Exam Set 3
FOR MORE CLASSES VISIT
www.cis359study.com
CIS 359 Midterm Exam Set 3