New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-76 Exam - Topic 2 Question 56 Discussion

Actual exam question for Eccouncil's 312-76 exam
Question #: 56
Topic #: 2
[All 312-76 Questions]

Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Cathern
4 months ago
Nah, it's C for sure, Network-based is the way to go!
upvoted 0 times
...
Mila
4 months ago
Really? I didn't know Host-based was so involved.
upvoted 0 times
...
Dacia
4 months ago
A is correct, it monitors the OS directly.
upvoted 0 times
...
Janae
4 months ago
I thought it was B, the Behavior-based ID system?
upvoted 0 times
...
Royal
4 months ago
Definitely A, the Host-based ID system does that.
upvoted 0 times
...
Kris
5 months ago
I’m leaning towards C, the Network-based ID system, but now that I think about it, that might not focus on the OS specifically.
upvoted 0 times
...
Delmy
5 months ago
I feel like I've seen a question like this before, and I think it was about how Host-based systems log activities.
upvoted 0 times
...
Shawna
5 months ago
I'm not entirely sure, but I remember something about Behavior-based ID systems being more about analyzing patterns rather than just logging.
upvoted 0 times
...
Tamesha
5 months ago
I think the answer might be A, the Host-based ID system, since it focuses on monitoring the operating system directly.
upvoted 0 times
...
Nobuko
5 months ago
I've got a good feeling about this one. I think the answer is C - changing the data type of a field used as an external ID from number to text.
upvoted 0 times
...
Denae
5 months ago
I remember the Principles focusing a lot on equitable treatment of shareholders, so I think statement A is true.
upvoted 0 times
...
Joanne
5 months ago
Okay, let's see. A router config standard would likely cover things like access control, user permissions, and maybe some audit or logging requirements. I'll eliminate the obvious wrong answers and go from there.
upvoted 0 times
...

Save Cancel