Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CFA-001 Topic 1 Question 80 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 80
Topic #: 1
[All CFA-001 Questions]

An intrusion detection system (IDS) gathers and analyzes information from within a computer or a network to identify any possible violations of security policy, including unauthorized access, as well as misuse.

Which of the following intrusion detection systems audit events that occur on a specific host?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

King
6 months ago
I think both B) Host-based intrusion detection and C) Log file monitoring could be correct. They both focus on specific host activities.
upvoted 0 times
...
Lauran
6 months ago
I believe C) Log file monitoring can also audit events that occur on a specific host.
upvoted 0 times
...
Maybelle
6 months ago
I agree with Jeannetta. Host-based intrusion detection focuses on a specific host.
upvoted 0 times
...
Jeannetta
6 months ago
I think the answer is B) Host-based intrusion detection.
upvoted 0 times
...
Rikki
6 months ago
File integrity checking helps ensure that critical system files have not been tampered with.
upvoted 0 times
...
Boris
6 months ago
Log file monitoring is important for detecting suspicious activities in system logs.
upvoted 0 times
...
Zita
6 months ago
I believe network-based intrusion detection analyzes traffic on the network.
upvoted 0 times
...
Malcolm
7 months ago
I agree with Jane. Host-based intrusion detection focuses on the individual host.
upvoted 0 times
...
Arlene
7 months ago
I think host-based intrusion detection audits events that occur on a specific host.
upvoted 0 times
...
Gussie
8 months ago
True, true. I'm feeling pretty confident about B) Host-based intrusion detection now. Let's just hope the exam question doesn't try to trick us with some obscure IDS technology we've never heard of!
upvoted 0 times
...
Arthur
8 months ago
Good point. Log file monitoring and file integrity checking are more like supporting tools or techniques that can be used in conjunction with an IDS, but they're not full-fledged IDS solutions on their own.
upvoted 0 times
William
7 months ago
Yes, host-based intrusion detection focuses on monitoring events that occur on a specific host.
upvoted 0 times
...
Curtis
7 months ago
B) Host-based intrusion detection
upvoted 0 times
...
...
Haydee
8 months ago
I agree, but what about the other options? I'm a bit iffy on C) Log file monitoring and D) File integrity checking. Are those considered types of intrusion detection systems too?
upvoted 0 times
...
Ivan
8 months ago
Exactly! The question specifically says the IDS gathers and analyzes information from within a computer or network, so host-based is the way to go.
upvoted 0 times
...
William
8 months ago
Yeah, that's what I was thinking too. A host-based IDS monitors and analyzes events on a specific host or system, whereas a network-based IDS looks at traffic across the network.
upvoted 0 times
...
Taryn
8 months ago
This question seems pretty straightforward. I'm pretty sure the answer is B) Host-based intrusion detection.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77