ExamGecko
Question list
Search
Search

Question 46 - D-ISM-FN-23 discussion

Report
Export

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?

A.
Intrusion-based
Answers
A.
Intrusion-based
B.
Policy-based
Answers
B.
Policy-based
C.
Anomaly- Based
Answers
C.
Anomaly- Based
D.
Signature-based
Answers
D.
Signature-based
Suggested answer: D

Explanation:

Signature-based IDPS uses a database that contains known attack patterns or signatures. Each signature is associated with a particular type of attack and the IDPS will look for those patterns in order to identify malicious activity. For example, if the signature in the database is associated with a buffer overflow attack, the IDPS will look for that particular pattern of attack in order to detect the attack.

asked 16/09/2024
Mitesh Patel
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first