NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It is passive
|
|
It can be host based
|
|
It can be prevent attack
|
|
It adds processing overhead
|
Detailed explanation-1: -The IDS/IPS can’t detect a malicious actor “legitimately” logging in to a critical system because the admin user’s password was password123.
Detailed explanation-2: -Which of the following is true about an intrusion detection system? An intrusion detection system maintains an active security role within the network. An intrusion detection system can terminate or restart other processes on the system.
Detailed explanation-3: -Intrusion detection systems are designed to be deployed in different environments. And like many cybersecurity solutions, an IDS can either be host-based or network-based. Host-Based IDS (HIDS): A host-based IDS is deployed on a particular endpoint and designed to protect it against internal and external threats.