PrepAway - Latest Free Exam Questions & Answers

Which of the following are used in an attack detected by an IDS?

Which of the following are used in an attack detected by an IDS?

PrepAway - Latest Free Exam Questions & Answers

A.
An event-based ID or a statistical anomaly-based ID

B.
A discrete anomaly-based ID or a signature-based ID

C.
A signature-based ID or a statistical anomaly-based ID

D.
A signature-based ID or an event-based ID

Explanation:
An IDS detects an attack through a signature-based ID or a statisticalanomaly-based ID. Signature-based IDS are the most popular IDS products today, andtheir effectiveness depends upon regularly updating the software with newsignatures, as with antivirus software. A statistical anomaly-based IDS is abehavioral-based system. Behavioral-based IDS products do not use predefinedPage 7cess trol-P5.txtsignatures, but rather are put in a learning mode to build a profile of anenvironment’s "normal" activities.


Leave a Reply