Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium GIAC GISP Dumps Questions Answers

Page: 1 / 25
Total 659 questions

GIAC?Information Security Professional Questions and Answers

Question 1

Which of the following is generally practiced by the police or any other recognized governmental authority?

Options:

A.

SMB signing

B.

Phishing

C.

Spoofing

D.

Wiretapping

Buy Now
Question 2

Which of the following is executed when a predetermined event occurs?

Options:

A.

Worm

B.

Trojan horse

C.

Logic bomb

D.

MAC

Question 3

Which of the following types of computers is used for attracting potential intruders?

Options:

A.

Honey pot

B.

Bastion host

C.

Data pot

D.

Files pot

Question 4

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Impersonation attack

C.

Vulnerability attack

D.

Man-in-the-middle attack

Question 5

What is the hash value length of the Secure Hash Algorithm (SHA-1)?

Options:

A.

164-bit

B.

320-bit

C.

128-bit

D.

160-bit

Question 6

Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?

Options:

A.

Microsoft Point-to-Point Encryption (MPPE)

B.

Pretty Good Privacy (PGP)

C.

Data Encryption Standard (DES)

D.

IP Security (IPSec)

Question 7

Which of the following performs packet screening for security on the basis of port numbers?

Options:

A.

Switch

B.

DNS

C.

Hub

D.

Firewall

Question 8

Which of the following is used by the Diffie-Hellman encryption algorithm?

Options:

A.

Password

B.

Access control entry

C.

Key exchange

D.

Access control list

Question 9

You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:

45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72

Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

Options:

A.

16, ICMP

B.

41, TCP

C.

16, UDP

D.

41, UDP

Question 10

In which of the following does a Web site store information such as user preferences to provide customized services to users?

Options:

A.

ActiveX control

B.

Keyword

C.

Protocol

D.

Cookie

Question 11

Which of the following statements about RSA algorithm are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a block cipher in which plain text and cipher text are integers between 0 and n-1.

B.

It is a stream cipher in which plain text and cipher text are integers between 0 and n-1.

C.

It is an asymmetric algorithm.

D.

It is a symmetric algorithm.

Question 12

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Question 13

Which of the following works at the network layer and hides the local area network IP address and topology?

Options:

A.

Hub

B.

MAC address

C.

Network address translation (NAT)

D.

Network interface card (NIC)

Question 14

Which of the following statements about the Instant messaging programs are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Most of the programs have no encryption facility.

B.

They allow effective and efficient communication and immediate receipt of reply.

C.

They provide secure password management.

D.

They can bypass corporate firewalls.

Question 15

Which of the following protocols multicasts messages and information among all member devices in an IP multicast group?

Options:

A.

ARP

B.

TCP

C.

ICMP

D.

IGMP

Question 16

Which of the following components come under the physical layer of the OSI model?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Wall jacks

B.

Hubs

C.

Switches

D.

Fiber cabling

E.

RJ-45 connectors

Question 17

Which of the following is required to be backed up on a domain controller to recover Active Directory?

Options:

A.

Installed third party application's folders

B.

User's personal data

C.

Operating System files

D.

System state data

Question 18

Which of the following concepts represent the three fundamental principles of information security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Integrity

B.

Privacy

C.

Confidentiality

D.

Availability

Question 19

Which of the following processes is known as Declassification?

Options:

A.

Verifying the identity of a person, network host, or system process.

B.

Physically destroying the media and the information stored on it.

C.

Assessing the risk involved in making a confidential document available to public.

D.

Removing the content from the media so that it is difficult to restore.

Question 20

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company.

To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Options:

A.

Email spoofing

B.

Social engineering

C.

Web ripping

D.

Steganography

Question 21

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It disrupts connections between two computers, preventing communications between services.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts services to a specific computer.

Question 22

Which of the following protocols work at the session layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

File Transfer Protocol (FTP)

B.

Remote Procedure Call (RPC)

C.

Network File System (NFS)

D.

Transmission Control Protocol (TCP)

Question 23

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Visitors

B.

Customers

C.

Employees

D.

Hackers

Question 24

Which of the following classes of fire comes under Class C fire?

Options:

A.

Combustible metals fire

B.

Paper or wood fire

C.

Oil fire

D.

Electronic or computer fire

Question 25

Which of the following tools was developed by the FBI and is used for keystroke logging in order to capture encryption keys and other information useful for deciphering transmissions?

Options:

A.

Alchemy Remote Executor

B.

Stealth Voice Recorder

C.

KeyGhost USB keylogger

D.

KeyGhost keylogger

E.

Magic Lantern

Question 26

Which of the following hashing algorithms produces a variable length hash value?

Options:

A.

MD5

B.

SHA

C.

HAVAL

D.

MD4

Question 27

Which of the following access control models requires centralize database of user accounts?

Options:

A.

User based

B.

Data based

C.

Group based

D.

Partitions based

Question 28

John works as a Network Administrator for We-are-secure Inc. The We-are-secure server is based on Windows Server 2003. One day, while analyzing the network security, he receives an error message that Kernel32.exe is encountering a problem. Which of the following steps should John take as a countermeasure to this situation?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

He should upgrade his antivirus program.

B.

He should restore his Windows settings.

C.

He should observe the process viewer (Task Manager) to see whether any new process is running on the computer or not. If any new malicious process is running, he should kill that process.

D.

He should download the latest patches for Windows Server 2003 from the Microsoft site, so that he can repair the kernel.

Question 29

Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Options:

A.

Tunneling

B.

Spoofing

C.

Packet filtering

D.

Packet sniffing

Question 30

Which of the following encryption algorithms are based on stream ciphers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Twofish

B.

RC4

C.

FISH

D.

Blowfish

Question 31

Fill in the blank with the appropriate layer name of the OSI model.

Secure Socket Layer (SSL) operates at the _____ layer of the OSI model.

Options:

A.

transport

Question 32

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Question 33

Which of the following are politically motivated threats that an organization faces?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Power distribution outages

B.

Civil disobedience

C.

Riot

D.

Vandalism

E.

Terrorist attacks

Question 34

Which of the following types of virus is capable of changing its signature to avoid detection?

Options:

A.

Macro virus

B.

Polymorphic virus

C.

Stealth virus

D.

Boot sector virus

Question 35

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

Strong encryption software should be used to store credit card information.

C.

The NTFS file system should be implemented on a client computer.

D.

Limited and authorized access should be allowed on the stored credit card information.

Question 36

Which of the following is NOT a countermeasure against a spoofing attack?

Options:

A.

Patching operating system

B.

Installing Anti-virus software

C.

Patching application

D.

Employing IDS

Question 37

Brutus is a password cracking tool that can be used to crack the following authentications:

•HTTP (Basic Authentication)

•HTTP (HTML Form/CGI)

•POP3 (Post Office Protocol v3)

•FTP (File Transfer Protocol)

•SMB (Server Message Block)

•Telnet

Which of the following attacks can be performed by Brutus for password cracking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Dictionary attack

B.

Brute force attack

C.

Replay attack

D.

Hybrid attack

E.

Man-in-the-middle attack

Question 38

Which of the following protocols is used with a tunneling protocol to provide security?

Options:

A.

EAP

B.

IPSec

C.

FTP

D.

IPX/SPX

Question 39

Which of the following are the major tasks of risk management?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Assuring the integrity of organizational data

B.

Building Risk free systems

C.

Risk control

D.

Risk identification

Question 40

Maria works as a professional Ethical Hacker. She recently has been assigned a project to test the security of The company has provided the following information about the infrastructure of its network:

•Network diagrams of the we-are-secure infrastructure

•Source code of the security tools

•IP addressing information of the we-are-secure network

Which of the following testing methodologies is we-are-secure.com using to test the security of its network?

Options:

A.

Graybox

B.

Whitebox

C.

Blackbox

D.

Alpha testing

Question 41

Which of the following involves changing data prior to or during input to a computer in an effort to commit fraud?

Options:

A.

Wiretapping

B.

Spoofing

C.

Data diddling

D.

Eavesdropping

Question 42

Which of the following terms refers to a mechanism which proves that the sender really sent a particular message?

Options:

A.

Authentication

B.

Non-repudiation

C.

Confidentiality

D.

Integrity

Question 43

Which of the following statements about incremental backup are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It backs up the entire database, including the transaction log.

B.

It is the fastest method of backing up data.

C.

It backs up only the files changed since the most recent backup and clears the archive bit.

D.

It is the slowest method for taking a data backup.

Question 44

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against

__________.

Options:

A.

SNMP enumeration

B.

DNS zone transfer

C.

IIS buffer overflow

D.

NetBIOS NULL session

Question 45

Which of the following tools or services is used to find the entire IP address range used by an organization?

Options:

A.

TRACERT

B.

Ping Scanner

C.

PATHPING

D.

Share Scanner

Question 46

You work as a Network Administrator for NetTech Inc. The company's network has a Windows 2000 domain-based network. An employee of the company is dismissed for attempting to access secret data on the network. What measure will you take next to make the network secure?

Options:

A.

Change the password of the employee's user account.

B.

Disable the employee's user account.

C.

Remove the password of the employee's user account.

D.

Disconnect the employee's computer from the network.

Question 47

You work as a Network Administrator for Web World Inc. You want to host an e-commerce Web site on your network. You want to ensure that storage of credit card information is secure. Which of the following conditions should be met to accomplish this?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NT authentication should be required for all customers before they provide their credit card numbers.

B.

The NTFS file system should be implemented on a client computer.

C.

Strong encryption software should be used to store credit card information.

D.

Limited and authorized access should be allowed on the stored credit card information.

Question 48

Which of the following protocols work at the Session layer of the OSI model?

Options:

A.

User Datagram Protocol (UDP)

B.

Trivial File Transfer Protocol (TFTP)

C.

Border Gateway Multicast Protocol (BGMP)

D.

Internet Security Association and Key Management Protocol (ISAKMP)

Question 49

Which of the following statements about packet filtering is true?

Options:

A.

It is used to store information about confidential data.

B.

It is used to send confidential data on the public network.

C.

It allows or restricts the flow of encrypted packets to provide security.

D.

It allows or restricts the flow of specific types of packets to provide security.

Question 50

Which of the following is the most secure method of authentication?

Options:

A.

Biometrics

B.

Smart card

C.

Anonymous

D.

Username and password

Question 51

Which of the following are advantages of NTFS file system over FAT32 and FAT?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Support for file and folder level permissions.

B.

Support for dual-booting.

C.

Support for Encrypting File System (EFS).

D.

Support for audio files.

Question 52

Which of the following layers are the sub layers of the data-link layer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Media Access Control (MAC)

B.

Logical Link Control (LLC)

C.

Reserve Address Resolution Protocol (RARP)

D.

Serial Line Internet Protocol (SLIP)

Question 53

Which of the following is the best method to stop vulnerability attacks on a Web server?

Options:

A.

Implementing the latest virus scanner

B.

Using strong passwords

C.

Configuring a firewall

D.

Installing service packs and updates

Question 54

In which of the following attacks does the attacker confuse the switch itself into thinking two ports have the same MAC address?

Options:

A.

ARP spoofing

B.

Replay

C.

Brute force

D.

MAC duplicating

Question 55

Which of the following safes are large enough to allow a person to enter?

Options:

A.

Wall safes

B.

Floor safes

C.

Vaults

D.

Chests

Question 56

Which of the following need to be reduced to suppress a fire?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Oxygen

B.

Fuel

C.

CO2

D.

High temperature

Question 57

Which of the following are the responsibilities of the custodian of data?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Security of data

B.

User authentication

C.

Maintaining integrity of data

D.

Backing up data

Question 58

It is the technique for gathering information for a Web site owner about a user through a few lines of code that reside in the Web pages. This information is gathered through __________.

Options:

A.

Spyware

B.

Spambot

C.

Bogus spyware removal programs

D.

Web Bugs

Question 59

Which of the following provides protection against network eavesdropping and signal interference and works at the physical layer?

Options:

A.

IPSec protocol

B.

Router

C.

Switch

D.

Shielded twisted pair (STP)

Question 60

Which of the following are the levels of military data classification system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Top Secret

B.

Sensitive

C.

Public

D.

Unclassified

E.

Secret

F.

Confidential

Question 61

Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Data service

B.

Account service

C.

Authentication service

D.

Ticket-granting service

Question 62

Which of the following components come under the network layer of the OSI model?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Firewalls

B.

Hub

C.

Routers

D.

MAC addresses

Question 63

Which of the following rated systems of the Orange book has mandatory protection of the TCB?

Options:

A.

B-rated

B.

A-rated

C.

D-rated

D.

C-rated

Question 64

Which of the following encryption strengths is used to secure NTLM version 2 passwords?

Options:

A.

56-bit

B.

32-bit

C.

128-bit

D.

64-bit

Question 65

A ________ is a detailed step-by-step document that explains exactly what is to be done.

Options:

A.

Procedure

B.

Baseline

C.

Standard

D.

Rule

Question 66

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For monitoring unauthorized zone transfer

B.

For preventing malware attacks on a DNS server

C.

For recording the number of queries resolved

D.

For measuring a DNS server's performance

Question 67

Which of the following techniques allows an attacker to take network traffic coming towards a host at one port and redirect it from that host to another host.

Options:

A.

Blackbox testing

B.

Port redirection

C.

Firewalking

D.

Brainstorming

Question 68

On which of the following OSI model layers does the Point-to-Point Protocol (PPP) work?

Options:

A.

Session layer

B.

Transport layer

C.

Application layer

D.

Data-link layer

Question 69

Which of the following services are provided by Remote Authentication Dial-In User Service (RADIUS)?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Authentication

B.

Data encryption

C.

Authorization

D.

Accounting

Question 70

The _______ protocol allows applications to communicate across a network in a way designed to prevent eavesdropping and message forgery.

Options:

A.

PPP

B.

TCP

C.

EAP

D.

TLS

Question 71

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Question 72

Which of the following is not a level of military data-classification system?

Options:

A.

Unclassified

B.

Normal

C.

Confidential

D.

Top secret

Question 73

At which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?

Options:

A.

The Physical layer

B.

The Network layer

C.

The Data-Link layer

D.

The Presentation layer

Question 74

Which of the following protocols are used to provide secure communication between a client and a server over the Internet?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

HTTP

B.

SSL

C.

SNMP

D.

TLS

Question 75

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Question 76

Which of the following steps are generally followed in computer forensic examinations?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Encrypt

B.

Acquire

C.

Authenticate

D.

Analyze

Question 77

Which of the following terms is used for the process of securing a system or a device on a network infrastructure?

Options:

A.

Authentication

B.

Sanitization

C.

Hardening

D.

Cryptography

Question 78

Which of the following formulas is used to determine the Single Loss Expectancy (SLE)?

Options:

A.

Single Loss Expectancy x Annualized Rate of Occurrence

B.

ALE before implementing safeguard + ALE after implementing safeguard + annual cost of safeguard

C.

ALE before implementing safeguard - ALE after implementing safeguard - annual cost of safeguar

D.

Asset Value x Exposure factor

Question 79

Which of the following methods is a behavior-based IDS detection method?

Options:

A.

Protocol detection

B.

Statistical anomaly detection

C.

Pattern matching detection

D.

Knowledge-based detection

Question 80

Which of the following rate systems of Orange book has mandatory protection of the Trusted Computing Base (TCB)?

Options:

A.

B-rated system

B.

A-rated system

C.

D-rated system

D.

C-Rated system

Question 81

Which of the following tools is a component of Cisco Adaptive Security Appliance (ASA) and provides an in-depth security design to prevent various types of problems such as viruses, spams, and spyware?

Options:

A.

Anti-x

B.

LIDS

C.

Scanlogd

D.

KFSensor

Question 82

Which of the following heights of fence deters only casual trespassers?

Options:

A.

3 to 4 feet

B.

2 to 2.5 feet

C.

8 feet

D.

6 to 7 feet

Question 83

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided laptops to its sales team members. You have configured access points in the network to enable a wireless network. The company's security policy states that all users using laptops must use smart cards for authentication. Which of the following authentication techniques will you use to implement the security policy of the company?

Options:

A.

IEEE 802.1X using EAP-TLS

B.

Pre-shared key

C.

IEEE 802.1X using PEAP-MS-CHAP

D.

Open system

Question 84

You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Rename the Administrator account.

B.

Remove the Administrator account.

C.

Disable the Guest account.

D.

Enable the Guest account.

Question 85

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He writes the following snort rule:

This rule can help him protect the We-are-secure server from the __________.

Options:

A.

Chernobyl virus

B.

I LOVE YOU virus

C.

Melissa virus

D.

Nimda virus

Question 86

Which of the following is the best way of protecting important data against virus attack?

Options:

A.

Updating the anti-virus software regularly.

B.

Taking daily backup of data.

C.

Using strong passwords to log on to the network.

D.

Implementing a firewall.

Question 87

Which of the following does Certification Authority (CA) provide in an e-commerce system?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Credit

B.

Trust

C.

Transparency

D.

Identification

Question 88

Which of the following standards is used in wireless local area networks (WLANs)?

Options:

A.

IEEE 802.4

B.

IEEE 802.11b

C.

IEEE 802.5

D.

IEEE 802.3

Question 89

Which of the following statements about active attack is true?

Options:

A.

It does not insert false packets into the data stream.

B.

It makes the computer's network services unavailable.

C.

It inserts false packets into the data stream.

D.

It locks out the users' accounts.

Question 90

Which of the following statements about Network Address Translation (NAT) are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It allows the computers in a private network to share a global, ISP assigned address to connect to the Internet.

B.

It reduces the need for globally unique IP addresses.

C.

It allows external network clients access to internal services.

D.

It provides added security by using Internet access to deny or permit certain traffic from the Bastion Host.

Question 91

Fill in the blank with the appropriate value.

Primary Rate Interface (PRI) of an ISDN connection contains _______ B channels and ______ D channel.

Options:

A.

23,1

Question 92

Which of the following are the application layer protocols for security?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Secure Hypertext Transfer Protocol (S-HTTP)

B.

Secure Sockets Layer (SSL)

C.

Secure Electronic Transaction (SET)

D.

Secure Shell (SSH)

Question 93

Which of the following terms is used for securing an operating system from an attack?

Options:

A.

System hacking

B.

System hardening

C.

System mirroring

D.

System indexing

Question 94

Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Secret

B.

Asymmetric

C.

Synchronous

D.

Symmetric

Question 95

Which of the following refers to encrypted text?

Options:

A.

Plaintext

B.

Cookies

C.

Hypertext

D.

Ciphertext

Question 96

Which of the following type of errors occurs when a legitimate user incorrectly denied access to resources by the Biometrics authentication systems?

Options:

A.

Type II

B.

Type I

C.

Type III

D.

Type IV

Question 97

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Options:

A.

Piggybacking

B.

Hacking

C.

Session hijacking

D.

Keystroke logging

Question 98

When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

Options:

A.

False positive

B.

False negative

C.

True negative

D.

True positive

Page: 1 / 25
Total 659 questions