Which two statements are true about IDS Signatures? (Choose two.)
Which two statements are true about IDS Signatures? (Choose two.)
An IDS signature is a set of rules used to detect malicious activity on a network by matching patterns that indicate specific types of attacks or exploits. Users can upload their own IDS signature definitions to extend the capabilities of their IDS with custom or updated signatures. This allows for flexibility and quick adaptation to new threats. Additionally, one of the primary functions of an IDS signature is to identify known exploits and vulnerabilities, providing critical information for detecting and mitigating security risks. Thus, the correct options are those that highlight these core functionalities.
DE are correct options D. An IDS signature contains data used to identify known exploits and vulnerabilities. E. An IDS signature contains a set of instructions that determine which traffic is analyzed.
Saw in the ICM 4.0 chapter 8 : For the D answer : An IDS/IPS signature contains metadata that is used to identify an attacker's attempt to exploit a known operating system or application vulnerability. Such metadata provides context about the attempt, such as the affected product, attack target, and so on For the E answer : An IDS/IPS policy is a collection of IDS/IPS rules. An IDS/IPS rule contains a set of instructions that determine which traffic is analyzed, including values for the following parameters: • Sources and Destinations • Services • Security Profiles (IDS/IPS profile) • Applied to • Mode
DE are correct options D. An IDS signature contains data used to identify known exploits and vulnerabilities. E. An IDS signature contains a set of instructions that determine which traffic is analyzed.
Trick question, E says JDS, not IDS, or is that just a typo?
A: You can also upload your own signatures. Reference: Hoogendoorn, Iwan. Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations (p. 80). D: An IDS/IPS signature contains metadata that is used to identify an attacker's attempt to exploit a known operating system or application vulnerability. Such metadata provides context about the attempt, such as the affected product, attack target, and so on. Reference ICM 8-11 page 395
AD is the answer. Users are allowed to upload their own signature
D and E. Supposed a typo error on E. https://docs.vmware.com/en/VMware-SD-WAN/5.4/VMware-SD-WAN-Administration-Guide/GUID-0BB81F8D-70EB-42D4-ABAF-F80C8F77A4CB.html
c: Trustworthy is not valid
DE correct
I vote for D and E (have assumed JDS is a typo). A is not correct, while you can upload signatures, they are not your own, they are from vmware that you downloaded eleswhere because NSX manager does not have internet access.
Reference: Chapter 8 CIM