Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Test  >  Computer Networks  >  Test: Intrusion Detection Systems - Computer Science Engineering (CSE) MCQ

Intrusion Detection Systems - Free MCQ Practice Test with solutions, GATE


MCQ Practice Test & Solutions: Test: Intrusion Detection Systems (10 Questions)

You can prepare effectively for Computer Science Engineering (CSE) Computer Networks with this dedicated MCQ Practice Test (available with solutions) on the important topic of "Test: Intrusion Detection Systems". These 10 questions have been designed by the experts with the latest curriculum of Computer Science Engineering (CSE) 2026, to help you master the concept.

Test Highlights:

  • - Format: Multiple Choice Questions (MCQ)
  • - Duration: 10 minutes
  • - Number of Questions: 10

Sign up on EduRev for free to attempt this test and track your preparation progress.

Test: Intrusion Detection Systems - Question 1

Which of the following is an advantage of anomaly detection?

Detailed Solution: Question 1

Answer: c
Explanation: Once a protocol has been built and a behavior defined, the engine can scale more quickly and easily than the signature-based model because a new signature does not have to be created for every attack and potential variant.

Test: Intrusion Detection Systems - Question 2

A false positive can be defined as…

Detailed Solution: Question 2

Answer: d
Explanation: A false positive is any alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior.

Test: Intrusion Detection Systems - Question 3

One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?

Detailed Solution: Question 3

Answer: a
Explanation: There are legitimate political, budgetary and research reasons to want to see all the “attacks” against your connection, but given the care and feeding any IDS requires, do yourself a favor and keep your NIDS sensors on the inside of the firewall.

Test: Intrusion Detection Systems - Question 4

What is the purpose of a shadow honeypot?

Detailed Solution: Question 4

Answer: c
Explanation: “Shadow honeypots,” as researchers call them, share all the same characteristics of protected applications running on both the server and client side of a network and operate in conjunction with an ADS.

*Multiple options can be correct
Test: Intrusion Detection Systems - Question 5

 At which two traffic layers do most commercial IDSes generate signatures?

Detailed Solution: Question 5

Answer: b, d
Explanation: Most commercial IDSes generate signatures at the network and transport layers.

Test: Intrusion Detection Systems - Question 6

An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?

Detailed Solution: Question 6

Answer: b
Explanation: Second component of mechanisms are set in place to reenact known methods of attack and to record system responses.

Test: Intrusion Detection Systems - Question 7

When discussing IDS/IPS, what is a signature?

Detailed Solution: Question 7

Answer: b
Explanation: IDSes work in a manner similar to modern antivirus technology. They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity.

*Multiple options can be correct
Test: Intrusion Detection Systems - Question 8

“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?

Detailed Solution: Question 8

Answer: a, c
Explanation: Nemean automatically generates “semantics-aware” signatures based on traffic at the session and application layers.

Test: Intrusion Detection Systems - Question 9

Which of the following is used to provide a baseline measure for comparison of IDSes?

Detailed Solution: Question 9

Answer: a
Explanation: As the sensitivity of systems may cause the false positive/negative rates to vary, it’s critical to have some common measure that may be applied across the board.

Test: Intrusion Detection Systems - Question 10

Which of the following is true of signature-based IDSes?

Detailed Solution: Question 10

Answer: d
Explanation: They are constantly updated with attack-definition files (signatures) that describe each type of known malicious activity. They then scan network traffic for packets that match the signatures, and then raise alerts to security administrators.

21 videos|147 docs|66 tests
Information about Test: Intrusion Detection Systems Page
In this test you can find the Exam questions for Test: Intrusion Detection Systems solved & explained in the simplest way possible. Besides giving Questions and answers for Test: Intrusion Detection Systems, EduRev gives you an ample number of Online tests for practice
21 videos|147 docs|66 tests
Download as PDF