CERTIFIED-IN-CYBERSECURITY · Question #356
CERTIFIED-IN-CYBERSECURITY Question #356: Real Exam Question with Answer & Explanation
The correct answer is D: HIDS. HIDS. Host-based Intrusion Detection Systems (HIDS) are designed to monitor and detect malicious behavior on a single device, such as a personal computer (see ISC2 Study Guide, Chapter4, Module 2, under Intrusion Detection System). Network- based Intrusion Detection Systems (NIDS
Question
Which one of the following security tools would be in the best position to detect malicious behavior in a device (e.g., your personal computer)?
Options
- ANIDS
- BDLP
- CFirewall
- DHIDS
Explanation
HIDS. Host-based Intrusion Detection Systems (HIDS) are designed to monitor and detect malicious behavior on a single device, such as a personal computer (see ISC2 Study Guide, Chapter4, Module 2, under Intrusion Detection System). Network- based Intrusion Detection Systems (NIDS) are designed to monitor and detect malicious behavior on a network, while firewalls are designed to prevent malicious traffic from entering a network. Data Loss Prevention (DLP) systems are designed to detect and prevent the unauthorized transmission of sensitive data
Topics
Community Discussion
No community discussion yet for this question.