16 Apr Chapter 7 Review Questions
Chapter 7 Review Questions:
1. What common security system is an IDPS most like? In what ways are these systems
similar?
2. How does a false positive alarm differ from a false negative alarm? From a security
perspective, which is less desirable?
3. How does a network-based IDPS differ from a host-based IDPS?
4. How does a signature-based IDPS differ from a behavior-based IDPS?
5. What is a monitoring (or SPAN) port? What is it used for?
6. List and describe the three control strategies proposed for IDPSs.
7. What is a honeypot? How is it different from a honeynet?
8. How does a padded cell system differ from a honeypot?
