Intrusion Detection Systems
3 important questions on Intrusion Detection Systems
What two types of intrusion detection systems exist?
- Network-based IDS.
- Host-based IDS.
What two strategies for the placement of IDSs were presented? What are the pros and cons?
- Inline placement - Allows to directly interfere with network traffic. Because single point of failure, upon failure of IDS the network is inavailable.
- Monitoring via port mirror - Is good practice to use this.
What two detection strategies were presented for IDSs?
- Signature based
- Anomaly-based
The question on the page originate from the summary of the following study material:
- A unique study and practice tool
- Never study anything twice again
- Get the grades you hope for
- 100% sure, 100% understanding