nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #356

CERTIFIED-IN-CYBERSECURITY Question #356: Real Exam Question with Answer & Explanation

The correct answer is D: HIDS. HIDS. Host-based Intrusion Detection Systems (HIDS) are designed to monitor and detect malicious behavior on a single device, such as a personal computer (see ISC2 Study Guide, Chapter4, Module 2, under Intrusion Detection System). Network- based Intrusion Detection Systems (NIDS

Security Operations

Question

Which one of the following security tools would be in the best position to detect malicious behavior in a device (e.g., your personal computer)?

Options

  • ANIDS
  • BDLP
  • CFirewall
  • DHIDS

Explanation

HIDS. Host-based Intrusion Detection Systems (HIDS) are designed to monitor and detect malicious behavior on a single device, such as a personal computer (see ISC2 Study Guide, Chapter4, Module 2, under Intrusion Detection System). Network- based Intrusion Detection Systems (NIDS) are designed to monitor and detect malicious behavior on a network, while firewalls are designed to prevent malicious traffic from entering a network. Data Loss Prevention (DLP) systems are designed to detect and prevent the unauthorized transmission of sensitive data

Topics

#Security Tools#Intrusion Detection#Host Security

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions