• Post author:
  • Post category:Blog
  • Reading time:3 mins read
  • Post last modified:June 12, 2024

Which two of the following are true statements about the Snort detection system? (Choose two.)

  • Source code became proprietary after the Cisco acquisition.
  • It is an anomaly-based intrusion system.
  • The Base Ruleset is updated automatically and in real-time.
  • Snort is a signature-based intrusion detection system.
  • The NIDS mode of operation is the only mode that provides intrusion prevention functionality.
Explanation & Hint:

Two true statements about the Snort detection system are:

  1. Snort is a signature-based intrusion detection system.
    • Snort is widely known as a signature-based intrusion detection system (IDS), which means it uses predefined signatures of known threats to identify malicious activity. This allows Snort to detect and potentially prevent intrusions by looking for specific patterns or anomalies that match these signatures.
  2. The Base Ruleset is updated automatically and in real-time.
    • While Snort rule updates are not necessarily in real-time, the base ruleset can be configured to update automatically. Users can subscribe to the Snort rule feed for regular updates, which are then applied to their Snort installation to maintain up-to-date detection capabilities.

The other statements are not accurate:

  • Source code became proprietary after the Cisco acquisition.
    • This statement is false; the source code for Snort remained open source after Cisco’s acquisition. Cisco has continued to support the Snort community with updates and new versions of the software.
  • It is an anomaly-based intrusion system.
    • Snort is primarily known as a signature-based IDS, not an anomaly-based IDS. Anomaly-based systems typically use machine learning or statistical analysis to identify threats, which is different from Snort’s approach.
  • The NIDS mode of operation is the only mode that provides intrusion prevention functionality.
    • This statement is misleading. Snort can be configured in various modes, including as a Network Intrusion Detection System (NIDS) or an Inline Intrusion Prevention System (IPS). When deployed inline and with the appropriate response configurations, it can block traffic, providing intrusion prevention capabilities.

For more Questions and Answers:

Network Security Post-Assessment | CBROPS

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments