Question 64 of 120 from exam CISSP-ISSEP: Information Systems Security Engineering Professional

Question 64 of 120 from exam CISSP-ISSEP: Information Systems Security Engineering Professional

Question

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet.

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

The answer to the question is B. IDS.

IDS stands for Intrusion Detection System, which is designed to detect unwanted attempts at accessing, manipulating, and disabling computer systems through the Internet. An IDS monitors network traffic for suspicious activity and alerts system administrators when it detects potential security threats.

There are two types of IDS: network-based and host-based. Network-based IDS monitors network traffic, while host-based IDS monitors activity on individual computer systems.

IDS systems use a variety of detection methods to identify potential threats. Some common methods include signature-based detection, which looks for specific patterns of known threats, and anomaly-based detection, which looks for unusual activity that deviates from normal system behavior.

In contrast, DAS (Data At Rest Security) is a security concept that focuses on protecting data that is stored on physical devices, such as hard drives, USB drives, and other storage media. DAS systems can encrypt data or require authentication to access it, but they do not monitor network traffic for security threats.

ACL (Access Control List) is a set of rules that controls access to resources on a network. ACLs are typically used to control access to files, folders, and other resources on a server or network. ACLs are an important component of network security, but they do not detect security threats.

IPsec (Internet Protocol Security) is a protocol used to secure network communication over the Internet. IPsec can be used to encrypt network traffic and provide secure authentication for remote users accessing a network. However, it is not specifically designed to detect security threats.