nerdexam
CiscoCisco

200-201 · Question #556

200-201 Question #556: Real Exam Question with Answer & Explanation

The correct answer is C: A HIDS detects threats using a combination of signature-based and anomaly-based detection. A host-based intrusion detection system monitors activity on an individual host (such as logs, processes, file integrity, and system calls) and detects malicious behavior using both known patterns and deviations from normal behavior.

Submitted by jaden.t· Mar 6, 2026Security Monitoring

Question

What is the purpose of a host-based intrusion detection system (HIDS)?

Options

  • AA HIDS protects against threats via known denylisted hash databases of malware and
  • BA HIDS filters traffic according to configured firewall access lists rules.
  • CA HIDS detects threats using a combination of signature-based and anomaly-based detection
  • DA HIDS blocks potential anomaly activity of users.

Explanation

A host-based intrusion detection system monitors activity on an individual host (such as logs, processes, file integrity, and system calls) and detects malicious behavior using both known patterns and deviations from normal behavior.

Topics

#HIDS#intrusion detection#signature-based detection#anomaly detection

Community Discussion

No community discussion yet for this question.

Full 200-201 PracticeBrowse All 200-201 Questions