CiscoCisco
200-201 · Question #556
200-201 Question #556: Real Exam Question with Answer & Explanation
The correct answer is C: A HIDS detects threats using a combination of signature-based and anomaly-based detection. A host-based intrusion detection system monitors activity on an individual host (such as logs, processes, file integrity, and system calls) and detects malicious behavior using both known patterns and deviations from normal behavior.
Submitted by jaden.t· Mar 6, 2026Security Monitoring
Question
What is the purpose of a host-based intrusion detection system (HIDS)?
Options
- AA HIDS protects against threats via known denylisted hash databases of malware and
- BA HIDS filters traffic according to configured firewall access lists rules.
- CA HIDS detects threats using a combination of signature-based and anomaly-based detection
- DA HIDS blocks potential anomaly activity of users.
Explanation
A host-based intrusion detection system monitors activity on an individual host (such as logs, processes, file integrity, and system calls) and detects malicious behavior using both known patterns and deviations from normal behavior.
Topics
#HIDS#intrusion detection#signature-based detection#anomaly detection
Community Discussion
No community discussion yet for this question.