Computer Network Mcqs

Page No. 72

In RPC, while a server is processing the call, the client is blocked ________


aunless the client sends an asynchronous request to the server


bunless the call processing is complete


cfor the complete duration of the connection


d unless the server is disconnected



An RPC (remote procedure call) is initiated by the _________


aserver


bclient


cclient after the sever


da third party


View Answer client

Which of the following is true of signature-based IDSes?


aThey alert administrators to deviations from “normal” traffic behavior


bThey identify previously unknown attacks


cThe technology is mature and reliable enough to use on production networks


d They scan network traffic or packets to identify matches with attack-definition files



Which of the following is used to provide a baseline measure for comparison of IDSes?


a Crossover error rate


bFalse negative rate


c False positive rate


dBit error rate



“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?


aApplication layer and Transport layer


bNetwork layer and Application layer


cSession layer and Transport layer


dApplication layer and Session layer



When discussing IDS/IPS, what is a signature?


aAn electronic signature used to authenticate the identity of a user on the network


bAttack-definition file


cIt refers to “normal,” baseline network behavior


d It is used to authorize the users on a network



IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?


aInspection of password files to detect inadvisable passwords


bMechanisms put in place to reenact known methods of attack and record system responses


c Inspection of system to detect policy violations


dInspection of configuration files to detect inadvisable settings



At which two traffic layers do most commercial IDSes generate signatures?


aApplication layer and Network layer


bNetwork layer and Session Layer


c Transport layer and Application layer


dTransport layer and Network layer



What is the purpose of a shadow honeypot?


aTo flag attacks against known vulnerabilities


bTo help reduce false positives in a signature-based IDS


cTo randomly check suspicious traffic identified by an anomaly detection system


dTo enhance the accuracy of a traditional honeypot



One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?


aInside the firewall


b Outside the firewall


cBoth inside and outside the firewall


dNeither inside the firewall nor outside the firewall.


View Answer Inside the firewall

Goto Page No.

Page 72 of 75

Alphabetical MCQs Categories

Here below You find all kind of categories of MCQs in alphabetical order.


"Comprehensive Collection of MCQs: Alphabetically Organized by Subject"

"Discover an extensive collection of multiple-choice questions (MCQs) neatly categorized by subject from A to Z. This resource is designed for anyone eager to explore various topics in a straightforward and organized manner. Whether you're a student preparing for exams, an educator seeking supplementary materials, or simply curious about different subjects, this compilation offers a convenient way to learn and assess your knowledge. With questions arranged alphabetically, navigation is effortless, allowing you to delve into subjects of interest at your own pace. Engage, learn, and expand your understanding with this accessible and comprehensive repository of MCQs!"


BolPakistan

bolpakistan.com.pk includes Job Mcqs and Pak Mcqs is the Top Largest Mcqs Forum in World, in which you can read Mcqs of All Subjects, PPSC test preparation, FPSC, NTS and PPSC PAST PAPERS, PPSC PAST MCQS. A Collection of Repeated MCQs for JOBs seekers.

Copyright © 2024, Designed & Developed by BolPakistan