(ISC)2(ISC)2
SSCP · Question #365
SSCP Question #365: Real Exam Question with Answer & Explanation
Sign in or unlock SSCP to reveal the answer and full explanation for question #365. The question stem and answer options stay visible for context.
Submitted by ashley.k· Apr 18, 2026Risk Identification, Monitoring and Analysis
Question
Which of the following Intrusion Detection Systems (IDS) uses a database of attacks, known system vulnerabilities, monitoring current attempts to exploit those vulnerabilities, and then triggers an alarm if an attempt is found?
Options
- AKnowledge-Based ID System
- BApplication-Based ID System
- CHost-Based ID System
- DNetwork-Based ID System
Unlock SSCP to see the answer
You've previewed enough free SSCP questions. Unlock SSCP for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Intrusion Detection System (IDS)#Knowledge-based IDS#Signature-based IDS#Security Monitoring