COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
What is NOT a detection method used by an IDS or IPS examines the incoming data streams for?
|
Signature-based detection
|
|
Snort-based detection
|
|
Policy-based detection
|
|
Anomaly-based detection
|
Explanation:
Detailed explanation-1: -Detection Method of IDS Deployment Signature Detection: Signature-based IDS solutions use fingerprints of known threats to identify them. Once malware or other malicious content has been identified, a signature is generated and added to the list used by the IDS solution to test incoming content.
Detailed explanation-2: -The majority of intrusion prevention systems use one of three detection methods: signature-based, statistical anomaly-based, and stateful protocol analysis. Signature-based detection: Signature-based IDS monitors packets in the network and compares with predetermined attack patterns, known as “signatures”.
There is 1 question to complete.