COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Monitors inbound and outbound traffic to identify suspicious traffic.
A
Network intrusion detection system (NIDS)
B
Distributed intrusion detection system (DIDS)
C
Host intrusion detection system (HIDS)
D
Intrusion prevention system
Explanation: 

Detailed explanation-1: -Network intrusion detection system (NIDS) Monitors inbound and outbound traffic to identify suspicious traffic.

Detailed explanation-2: -Network intrusion detection systems (NIDS) attempt to detect cyber attacks, malware, denial of service (DoS) attacks or port scans on a computer network or a computer itself. NIDS monitor network traffic and detect malicious activity by identifying suspicious patterns in incoming packets.

Detailed explanation-3: -NIDS systems utilise a combination of signature and anomaly-based detection methods. Signature-based detection involves comparing the characteristics of collected data packets against signature files that are known to be malicious.

Detailed explanation-4: -The NIDS alerts the network administrator if the traffic matches a known signature. Signature-based detection is effective at identifying known attacks, but it cannot detect new or unknown attacks.

There is 1 question to complete.