hiexam
eccouncil · 212-82 · Q425 · multiple_choice · topic_1

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network…

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions. Identify the detection method employed by the IDS solution in the above scenario.
  • A.Not-use detection
  • B.Protocol anomaly detection
  • C.Anomaly detection
  • D.Signature recognition
Explanation
KEY WORD "defend against evolving threats" that is when anomaly comes in otherwise it could be signature based but that puts the difference

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.