CompTIA Exam Questions

Which of the following security mechanism would be MOST appropriate to confirm Joe’s suspicion?

Joe, a network security engineer, has visibility to network traffic through network monitoring tools.
However, he’s concerned that a disgruntled employee may be targeting a server containing the
company’s financial records. Which of the following security mechanism would be MOST
appropriate to confirm Joe’s suspicion?

A.
HIDS

B.
HIPS

C.
NIPS

D.
NIDS

Explanation:
A host-based IDS (HIDS) is an intrusion detection system that runs as a service on a host
computer system. It is used to monitor the machine logs, system events, and application activity
for signs of intrusion. It is useful for detecting attacks that originate outside the organization as well
as attacks by internal users logged on to the system.