ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 49 - H12-724 discussion

Report
Export

The network-based intrusion detection system is mainly used to monitor the information of the critical path of the network in real time, listen to all packets on the network, collect data, and divide Analyze the suspicious object, which of the following options are its main features? (multiple choices)

A.
Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so Not vulnerable to attack.
Answers
A.
Good concealment, the network-based monitor does not run other applications, does not provide network services, and may not respond to other computers, so Not vulnerable to attack.
B.
The monitoring speed is fast (the problem can be found in microseconds or seconds, and the hostbased DS needs to take an analysis of the audit transcripts in the last few minutes
Answers
B.
The monitoring speed is fast (the problem can be found in microseconds or seconds, and the hostbased DS needs to take an analysis of the audit transcripts in the last few minutes
C.
Need a lot of monitors.
Answers
C.
Need a lot of monitors.
D.
It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.
Answers
D.
It can detect the source address and destination address, identify whether the address is illegal, and locate the real intruder.
Suggested answer: A, B
asked 18/09/2024
Kishi Peart
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first