1.

Which of the following is true of signature-based IDSes?(a) They alert administrators to deviations from “normal” traffic behavior(b) They identify previously unknown attacks(c) The technology is mature and reliable enough to use on production networks(d) They scan network traffic or packets to identify matches with attack-definition filesThis question was addressed to me in quiz.This interesting question is from Intrusion Detection Systems in portion Point to Point Protocol & Error Detection of Computer Network

Answer»

Right option is (d) They scan network traffic or packets to identify matches with attack-definition files

The EXPLANATION is: They are constantly updated with attack-definition files (signatures) that describe each type of known MALICIOUS ACTIVITY. They then scan network traffic for packets that MATCH the signatures, and then raise alerts to security administrators.



Discussion

No Comment Found

Related InterviewSolutions