EC-CouncilEC-Council
312-49 · Question #45
312-49 Question #45: Real Exam Question with Answer & Explanation
Sign in or unlock 312-49 to reveal the answer and full explanation for question #45. The question stem and answer options stay visible for context.
Submitted by carlos_mx· Apr 18, 2026Computer Forensics Investigation Process
Question
An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security policy, including unauthorized access, as well as misuse. Which of the following intrusion detection systems audit events that occur on a specific host?
Options
- ANetwork-based intrusion detection
- BHost-based intrusion detection
- CLog file monitoring
- DFile integrity checking
Unlock 312-49 to see the answer
You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Intrusion Detection System (IDS)#Host-based IDS (HIDS)#Security Monitoring#Incident Detection