FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You are a security analyst who is reviewing the alerts and logs from your company’s intrusion detection system. You find an alert in the IDS that states that a data exfiltration was occurring. You analyze the logs and determine that the data being sent was just the nightly backup of your company’s database to its offsite facility. How should you classify this alert in the IDS?
A
True Positive
B
False Positive
C
True Negative
D
False Negative
Explanation: 

Detailed explanation-1: -Which of the following considerations is most important when employing a signature-based intrusion detection system? Signatures and rules must be kept up to date to protect against emerging threats.

Detailed explanation-2: -Abstract-Signature-based network intrusion detection sys-tems (S-IDS) have become an important security tool in the protection of an organization’s infrastructure against external intruders. By analyzing network traffic, S-IDS’ detect network intrusions.

Detailed explanation-3: -A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a website or web application. A WAF can be either network-based, host-based or cloud-based and is often deployed through a reverse proxy and placed in front of one or more websites or applications.

Detailed explanation-4: -It is important to assess sources when adding information to a data set. Considering threat intelligence, this data is likely to derive from external sources. Which factor is key in disseminating updates? Users at a company report that computers are suddenly acting strangely.

There is 1 question to complete.