Which one of the following is NOT a characteristic of an Intrusion Detection System? (IDS)
A.
Determines the source of incoming packets.
B.
Detects intruders attempting unauthorized activities.
C.
Recognizes and report alterations to data files.
D.
Alerts to known intrusion patterns.
Explanation:
Software employed to monitor and detect possible attacks and behaviors that vary from the normal
and expected activity. The IDS can be network-based, which monitors network traffic, or host-based,
which monitors activities of a specific system and protects system files and control mechanisms. –
Shon Harris All-in-one CISSP Certification Guide pg 932