COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following devices would detect but not react to suspicious behavior on the network?
A
NIPS
B
Firewall
C
NIDS
D
HIDS
Explanation: 

Detailed explanation-1: -A NIDS will detect suspicious behavior but most likely not react to it. To prevent it and react to it you would want a NIPS. Firewalls block certain types of traffic but by default do not check for suspicious behavior. HIDS is the host-based version of an IDS; it checks only the local computer, not the network.

Detailed explanation-2: -HIDS tools monitor the log files generated by your applications and create a historical record of activities and functions, therefore allowing you to quickly identify any anomalies and signs of an intrusion that may have occurred.

Detailed explanation-3: -An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

There is 1 question to complete.