Question 6 of 1775
Mike, a network administrator, has been asked to passively monitor network traffic to the companys sales websites. Which of the following would be BEST suited for this task?
    Correct Answer: A

    A host-based intrusion detection system (HIDS) is best suited for passively monitoring network traffic as it watches the audit trails and log files of a host system. It is reliable for detecting attacks directed against a host, whether they originate from an external source or are being perpetrated by a user locally logged in to the host. Unlike a NIPS, which actively monitors and can prevent intrusions, HIDS passively analyzes data after it has been collected.

Question 7 of 1775
Which of the following should be deployed to prevent the transmission of malicious traffic between virtual machines hosted on a singular physical device on a network?
    Correct Answer: A

Question 8 of 1775
Pete, a security administrator, has observed repeated attempts to break into the network. Which of the following is designed to stop an intrusion on the network?
    Correct Answer: A

Question 9 of 1775
An administrator is looking to implement a security device which will be able not only to detect network intrusions at the organization level, but also help to defend against them.
Which of the following is being described here?
    Correct Answer: B

Question 10 of 1775
In intrusion detection system vernacular, which account is responsible for setting the security policy for an organization?
    Correct Answer: B