Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIA Topic 7 Question 50 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 50
Topic #: 7
[All GCIA Questions]

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Donte
1 months ago
Can't we just use a network-based IDS to monitor the network traffic and then send the intruders a strongly worded email? That's how I handle all my cybersecurity problems.
upvoted 0 times
...
Lisandra
1 months ago
Wait, what? Comparing network traffic to a baseline? That sounds like a lot of work. I just want to get this exam over with. Maybe I'll just go with the most tech-sounding option, anomaly-based. That's gotta be it, right?
upvoted 0 times
Virgie
6 days ago
I'm not sure, but I think network-based might be the right answer. It seems to match the description.
upvoted 0 times
...
Arthur
11 days ago
Yeah, I agree. It's always good to go with the option that sounds the most advanced.
upvoted 0 times
...
Camellia
12 days ago
I think anomaly-based is a good choice. It does sound pretty techy.
upvoted 0 times
...
...
Lorrine
1 months ago
Ooh, I know this one! It's definitely anomaly-based. That's the one that looks for deviations from the normal traffic patterns, right? I got this!
upvoted 0 times
Katy
2 days ago
Yes, you're correct! Anomaly-based IDS does indeed monitor network traffic for deviations from normal patterns.
upvoted 0 times
...
...
Franklyn
2 months ago
Okay, let's think this through. Signature-based and file-based don't really fit the description, so I'm gonna go with either network-based or anomaly-based.
upvoted 0 times
Carissa
11 days ago
Let's go with anomaly-based then.
upvoted 0 times
...
Eleni
27 days ago
Yeah, I agree. Network-based seems like a good choice too.
upvoted 0 times
...
Jessenia
1 months ago
I think anomaly-based makes more sense here.
upvoted 0 times
...
...
Filiberto
2 months ago
Hmm, this one seems tricky. I remember learning about the different types of IDS, but I'm not sure which one specifically monitors network traffic against a baseline.
upvoted 0 times
Launa
1 days ago
Great, thanks for the clarification!
upvoted 0 times
...
Whitney
3 days ago
I agree, Anomaly-based IDS monitors network traffic against a baseline
upvoted 0 times
...
Sherell
5 days ago
That makes sense, thanks for the clarification!
upvoted 0 times
...
Talia
6 days ago
I think the answer is D) Anomaly-based
upvoted 0 times
...
Maddie
6 days ago
I agree, Anomaly-based IDS monitors network traffic against a baseline.
upvoted 0 times
...
Tomoko
7 days ago
I think the correct answer is D) Anomaly-based.
upvoted 0 times
...
Cyndy
8 days ago
D) Anomaly-based
upvoted 0 times
...
Stephaine
9 days ago
D) Anomaly-based
upvoted 0 times
...
Stevie
9 days ago
C) File-based
upvoted 0 times
...
Walker
12 days ago
B) Network-based
upvoted 0 times
...
Reita
13 days ago
A) Signature-based
upvoted 0 times
...
Rosalyn
19 days ago
C) File-based
upvoted 0 times
...
Glynda
26 days ago
B) Network-based
upvoted 0 times
...
Donette
1 months ago
A) Signature-based
upvoted 0 times
...
...
Howard
2 months ago
I'm not sure, but I think it's between B) Network-based and D) Anomaly-based.
upvoted 0 times
...
Rory
2 months ago
I agree with Bok, Anomaly-based IDS compares network traffic against a baseline to detect unusual behavior.
upvoted 0 times
...
Bok
3 months ago
I think the answer is D) Anomaly-based.
upvoted 0 times
...

Save Cancel