PrepAway - Latest Free Exam Questions & Answers

Which of the following types of technologies will BEST address this scenario?

Joe, the Chief Technical Officer (CTO), is concerned about new malware being introduced into the
corporate network. He has tasked the security engineers to implement a technology that is
capable of alerting the team when unusual traffic is on the network. Which of the following types of
technologies will BEST address this scenario?

PrepAway - Latest Free Exam Questions & Answers

A.
Application Firewall

B.
Anomaly Based IDS

C.
Proxy Firewall

D.
Signature IDS

Explanation:
Anomaly-based detection watches the ongoing activity in the environment and looks for abnormal
occurrences. An anomaly-based monitoring or detection method relies on definitions of all valid
forms of activity. This database of known valid activity allows the tool to detect any and all
anomalies. Anomaly-based detection is commonly used for protocols. Because all the valid and
legal forms of a protocol are known and can be defined, any variations from those known valid
constructions are seen as anomalies.


Leave a Reply