ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 29 - 212-82 discussion

Report
Export

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.

Identify the detection method employed by the IDS solution in the above scenario.

A.
Not-use detection
Answers
A.
Not-use detection
B.
Protocol anomaly detection
Answers
B.
Protocol anomaly detection
C.
Anomaly detection
Answers
C.
Anomaly detection
D.
Signature recognition
Answers
D.
Signature recognition
Suggested answer: C

Explanation:

Anomaly detection is a type of IDS detection method that involves first creating models for possible intrusions and then comparing these models with incoming events to make a detection decision. It can detect unknown or zero-day attacks by looking for deviations from normal or expected behavior

asked 18/09/2024
Frank Acosta
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first