Across
- 2. This wired IDS sits on AF networks "listening" for suspicious activity. Generates reports for the AFNOSC (acronym).
- 5. Vulnerability scanners compare details about a targeted system against a list of known security ____.
- 7. ____ devices pretend to be legitimate access points in order to gather information from those devices connecting to them.
- 8. Wireless ____ tools are intended for attacking wireless access points.
- 10. An ____ Intrusion Detection System is also known as an Intrusion Prevention System.
- 11. NIDS cannot analyze ____ packets.
- 13. SNORT is an ____ source Network-based Intrusion Detection and Prevention System.
- 15. ____ NIDS abilities include detection of rogue devices and wireless attack tools.
Down
- 1. ____ records attributes of the host computer's memory and then monitors it to ensure it hasn't been modified (acronym).
- 3. Host-based Intrusion Detections Systems primarily use ____ installed on a specific host.
- 4. A ____ Scanner is a software application designed to probe a server or host for open ports.
- 6. ____ scanning software detects and classifies system weaknesses in computers & network devices. Run from an attacker's POV.
- 9. The function of an IDS is to ___ network traffic and computer settings to detect patterns indicating known intrusion attempts
- 12. An Intrusion Detection System scans, audits and monitors network infrastructure for signs of attacks in ____.
- 14. A major drawback of ____ is it cannot analyze encrypted packets (acronym).
