What is the optimal placement for network-based intrusion detection systems (NIDSs)?

A.
On the network perimeter, to alert the network administrator of all suspicious traffic
B.
On network segments with business-critical systems (e.g., demilitarized zones (DMZs) and on certain intranet segments)
C.
At the network operations center (NOC)
D.
At an external service provider
Explanation:
A:Intrusion detection systems (IDS) monitor activity and send alerts when they detect suspicious traffic. There are two broad classifications of IDS: host-based IDS, which monitor activity on servers and workstations, and networkbased IDS, which monitor network activity. Page 750.
On the network perimeter, to alert the network administrator of all suspicious traffic.
0
0