Web Security and Protection: Detecting Unwanted Attempts

Detecting Unwanted Attempts

Question

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

and worms)

Answer: D is incorrect.

Access Control List (ACL) is the most commonly used object in Cisco IOS.

It filters packets or network traffic by controlling.

An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet.

These attempts may take the form of attacks, as examples, by crackers, malware and/or disgruntled employees.

An IDS cannot directly detect attacks within properly encrypted traffic.

An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system.

This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, whether routed packets are forwarded or blocked at the router's interfaces.

According to the criteria specified within the access lists, router determines whether the packets to be forwarded or dropped.

Access control list criteria could be the source or destination address of the traffic or other information.

The types of Cisco using encryption and digital signing.

It enhances the security of data as if an IPSec packet is captured, its contents cannot be read.

IPSec also provides sender is directly attached to a server or workstation, without using a storage network.

The technology that is designed to detect unwanted attempts at accessing, manipulating, and disabling computer systems through the internet is called an Intrusion Detection System (IDS).

IDS works by analyzing network traffic and looking for patterns of behavior that are consistent with known attack techniques or malicious activity. When an attack or intrusion is detected, the IDS can alert security personnel, log the event, and take other defensive actions to prevent further damage.

Option A, DAS (Distributed Antenna System), is a technology used to enhance wireless network coverage in large areas like buildings, stadiums, or campuses. It is not related to network security.

Option B, IPsec (Internet Protocol Security), is a protocol used to secure communication between two devices over the internet. It provides confidentiality, authentication, and integrity of the data transmitted over the internet. However, it does not detect or prevent attacks or intrusions.

Option D, ACL (Access Control List), is a mechanism used to control access to network resources by specifying which users or systems are allowed or denied access. It does not provide intrusion detection capabilities.

Therefore, the correct answer to the given question is option C, IDS (Intrusion Detection System).