<< Prev Question Next Question >>

Question 32/33

Which of the following is NOT a characteristic of an intrusion detection system?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (33q)
Question 1: Modern encryption is classified as _____ or _____....
Question 2: What is the name of the data storage technology pictured her...
Question 3: Evidence is said to be reliable when _____...
Question 4: A _____ attack is a cyber attack where the attacker tries gu...
Question 5: Which of the following distributions was designed primarily ...
Question 6: SSID stands for what?
Question 7: Which of the following is a characteristic of social media?...
Question 8: Which internet protocol is responsible for re-transmitting l...
Question 9: Which of the following is NOT one of the seven layers of the...
Question 10: Class 2 Bluetooth devices have an expected range of _____ ?...
Question 11: Strictly speaking, which of the following is NOT a Linux dis...
Question 12: A Bluetooth device's unique address is _____?...
Question 13: A program which stands as a barrier between a computer syste...
Question 14: What is the difference between a 'white hat' and 'grey hat' ...
Question 15: Which of these is NOT Bluejacking?...
Question 16: _____ is anything that can negatively affect information....
Question 17: What is digital evidence?
Question 18: A _____ is anything that can negatively alter, disrupt, hide...
Question 19: A phishing attack that uses fraudulent websites to capture s...
Question 20: A/An _____ can happen if you're not careful when using publi...
Question 21: Bluesnarfing requires which of these?...
Question 22: A phishing attack that incorporates personal information abo...
Question 23: Which is considered the 'ethical' hacker?...
Question 24: Computer security is:
Question 25: The operating system uses _____ to ensure users have authori...
Question 26: Secure user authentication in cryptography is achieved by __...
Question 27: What is required for a VPN to function correctly?...
Question 28: Which of the following is NOT a threat/risk associated with ...
Question 29: Which of the following is NOT direct evidence?...
Question 30: In securing information and information systems, an organisa...
Question 31: Asymmetric encryption uses:
Question 32: Which of the following is NOT a characteristic of an intrusi...
Question 33: What are some of the tunnelling protocols that VPNs use?...