New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 7 Question 50 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 50
Topic #: 7
[All GCIA Questions]

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Levi
3 months ago
Anomaly-based? Really? I didn't know that!
upvoted 0 times
...
Shaquana
3 months ago
Wait, are we sure it's not A? Signature-based seems similar.
upvoted 0 times
...
Darell
3 months ago
I thought it was B, network-based does that too, right?
upvoted 0 times
...
Doretha
4 months ago
Totally agree, D is the right choice!
upvoted 0 times
...
Rodney
4 months ago
It's definitely D, anomaly-based IDS compares against a baseline.
upvoted 0 times
...
Alline
4 months ago
I’m a bit confused; I thought signature-based was more about known threats rather than monitoring against a baseline.
upvoted 0 times
...
Kris
4 months ago
I practiced a similar question, and I believe anomaly-based is correct because it detects unusual patterns compared to normal behavior.
upvoted 0 times
...
Raylene
4 months ago
I'm not entirely sure, but I remember something about network-based systems being more about traffic analysis rather than baselines.
upvoted 0 times
...
Ming
5 months ago
I think the answer might be D, anomaly-based, since it focuses on deviations from a baseline.
upvoted 0 times
...
Lavonna
5 months ago
I've got a good handle on IDS concepts, so I'm confident the answer is D. Anomaly-based IDS monitors network traffic and compares it to a baseline to detect unusual activity.
upvoted 0 times
...
Dell
5 months ago
I'm a bit confused on the differences between the IDS types. I'll have to review my notes to make sure I understand this properly before answering.
upvoted 0 times
...
Ettie
5 months ago
Okay, let me see. Signature-based IDS looks for known attack patterns, network-based IDS monitors the network, and file-based IDS checks file integrity. So I'm pretty sure the answer is D - Anomaly-based IDS.
upvoted 0 times
...
Lizbeth
5 months ago
This one seems pretty straightforward. I think the answer is D - Anomaly-based IDS, since it monitors network traffic and compares it to a baseline.
upvoted 0 times
...
Kate
5 months ago
Hmm, I'm not totally sure about this one. I know there are different types of IDS, but I'm a little fuzzy on the details. I'll have to think it through carefully.
upvoted 0 times
...
Avery
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to carefully read through the options and think about the implications of each approach.
upvoted 0 times
...
Chun
5 months ago
Hmm, I'm not sure about this one. The options all sound similar in terms of IT processes. I'll have to think it through carefully.
upvoted 0 times
...
Donte
9 months ago
Can't we just use a network-based IDS to monitor the network traffic and then send the intruders a strongly worded email? That's how I handle all my cybersecurity problems.
upvoted 0 times
...
Lisandra
9 months ago
Wait, what? Comparing network traffic to a baseline? That sounds like a lot of work. I just want to get this exam over with. Maybe I'll just go with the most tech-sounding option, anomaly-based. That's gotta be it, right?
upvoted 0 times
Salley
8 months ago
Signature-based could also be a good option. It's a common method used for intrusion detection.
upvoted 0 times
...
Virgie
8 months ago
I'm not sure, but I think network-based might be the right answer. It seems to match the description.
upvoted 0 times
...
Arthur
9 months ago
Yeah, I agree. It's always good to go with the option that sounds the most advanced.
upvoted 0 times
...
Camellia
9 months ago
I think anomaly-based is a good choice. It does sound pretty techy.
upvoted 0 times
...
...
Lorrine
9 months ago
Ooh, I know this one! It's definitely anomaly-based. That's the one that looks for deviations from the normal traffic patterns, right? I got this!
upvoted 0 times
Ronald
8 months ago
Actually, it's anomaly-based. It's all about detecting abnormal behavior on the network.
upvoted 0 times
...
Reuben
8 months ago
I think it's signature-based, it matches patterns of known attacks.
upvoted 0 times
...
Katy
8 months ago
Yes, you're correct! Anomaly-based IDS does indeed monitor network traffic for deviations from normal patterns.
upvoted 0 times
...
...
Franklyn
10 months ago
Okay, let's think this through. Signature-based and file-based don't really fit the description, so I'm gonna go with either network-based or anomaly-based.
upvoted 0 times
Carissa
9 months ago
Let's go with anomaly-based then.
upvoted 0 times
...
Eleni
9 months ago
Yeah, I agree. Network-based seems like a good choice too.
upvoted 0 times
...
Jessenia
9 months ago
I think anomaly-based makes more sense here.
upvoted 0 times
...
...
Filiberto
10 months ago
Hmm, this one seems tricky. I remember learning about the different types of IDS, but I'm not sure which one specifically monitors network traffic against a baseline.
upvoted 0 times
Launa
8 months ago
Great, thanks for the clarification!
upvoted 0 times
...
Whitney
8 months ago
I agree, Anomaly-based IDS monitors network traffic against a baseline
upvoted 0 times
...
Sherell
8 months ago
That makes sense, thanks for the clarification!
upvoted 0 times
...
Talia
8 months ago
I think the answer is D) Anomaly-based
upvoted 0 times
...
Maddie
8 months ago
I agree, Anomaly-based IDS monitors network traffic against a baseline.
upvoted 0 times
...
Tomoko
8 months ago
I think the correct answer is D) Anomaly-based.
upvoted 0 times
...
Cyndy
8 months ago
D) Anomaly-based
upvoted 0 times
...
Stephaine
8 months ago
D) Anomaly-based
upvoted 0 times
...
Stevie
8 months ago
C) File-based
upvoted 0 times
...
Walker
9 months ago
B) Network-based
upvoted 0 times
...
Reita
9 months ago
A) Signature-based
upvoted 0 times
...
Rosalyn
9 months ago
C) File-based
upvoted 0 times
...
Glynda
9 months ago
B) Network-based
upvoted 0 times
...
Donette
9 months ago
A) Signature-based
upvoted 0 times
...
...
Howard
11 months ago
I'm not sure, but I think it's between B) Network-based and D) Anomaly-based.
upvoted 0 times
...
Rory
11 months ago
I agree with Bok, Anomaly-based IDS compares network traffic against a baseline to detect unusual behavior.
upvoted 0 times
...
Bok
11 months ago
I think the answer is D) Anomaly-based.
upvoted 0 times
...

Save Cancel