ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 137 - H12-724 discussion

Report
Export

In the construction of information security, the intrusion detection system plays the role of a monitor.

It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O

A.
IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
Answers
A.
IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
B.
It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
Answers
B.
It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
C.
Unable to detect malicious operations or misoperations from internal killings.
Answers
C.
Unable to detect malicious operations or misoperations from internal killings.
D.
Cannot do in-depth inspection
Answers
D.
Cannot do in-depth inspection
Suggested answer: A
asked 18/09/2024
Feras Al Babtain
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first