NIS Question Bank
NIS Question Bank
NIS Question Bank
Types of ISD:-
Host based IDS: This examines activity on an individual system like a mail server, web
server or an individual PC. It is concerned only with the individual system and usually
does not look in to the activity on the n/w or systems around it.
b. N/w based IDS: This examines activity on the network itself. It will monitor only the
traffic across the n/w link and usually does not look in to the activity of individual
systems.
1.The host based IDS check log files and n/w traffic coming in to or leaving a specific
post.
2.It can operate in Real time, looking for activity as it arises or batch mode, looking
for activity on a periodic basis.
3. host based systems are self contained but many new systems are designed for
reporting to and managed by a central system.
4.These systems are also taking local system resources to operate.
5.ITIL framework?
Ans The IT Infrastructure Library (ITIL) framework is a set of best practices for IT service
management (ITSM) that aims to align IT services with the needs of businesses. ITIL outlines
processes, procedures, tasks, and checklists which are not organization-specific, but can be
applied by an organization for establishing integration with the organization's strategy,
delivering value, and maintaining a minimum level of competency. It allows the organization
to establish a baseline from which it can plan, implement, and measure. It is used to
demonstrate compliance and to measure improvement
[Type here]
6. DMZ ?
Ans Demilitarized zone (DMZ): Systems or sections of a private local network that
are made publicly available and visible from outside networks such as the Internet.
Usually, a publiclyaccessible resource (such as an HTTP server) is placed on a DMZ to
protect the internal network while maintaining proper functionality for outside users.
In computer networks, a DMZ (demilitarized zone) is a computer host or small
network inserted as a "neutral zone" between a company's private network and the
outside public network. It prevents outside users from getting direct access to a server
that has company data. A DMZ is an optional and more secure approach to a firewall
and effectively acts as a proxy server as well
8. COBIT framework?
Ans The Control Objectives for Information and related Technology (COBIT)
framework is a comprehensive IT management framework developed by ISACA
(Information Systems Audit and Control Association) to help businesses manage and
govern their information technology. Originally developed for IT auditors, COBIT has
evolved into a robust IT governance and management framework used by managers,
auditors, and IT professionals to bridge the gap between control requirements,
technical issues, and business risks
[Type here]