• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Which statement describes the policy-based intrusion detection approach?

  • It compares the signatures of incoming traffic to a known intrusion database.
  • It compares the antimalware definitions to a central repository for the latest updates.
  • It compares the operations of a host against well-defined security rules.
  • It compares the behaviors of a host to an established baseline to identify potential intrusion.
Explanation & Hint:

With the anomaly-based intrusion detection approach, a set of rules or policies are applied to a host. Violation of these policies is interpreted to be the result of a potential intrusion.

For more Questions and Answers:

Cybersecurity Essentials 3.0 Checkpoint Exam: OS and Endpoint Security Module 7 – 10 Exam Answers Full 100%

CyberOps Associate 1.02 & CA v1.0 Modules 21 – 23: Cryptography and Endpoint Protection Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments