Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIA Topic 7 Question 50 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 50
Topic #: 7
[All GCIA Questions]

Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Donte
3 months ago
Can't we just use a network-based IDS to monitor the network traffic and then send the intruders a strongly worded email? That's how I handle all my cybersecurity problems.
upvoted 0 times
...
Lisandra
3 months ago
Wait, what? Comparing network traffic to a baseline? That sounds like a lot of work. I just want to get this exam over with. Maybe I'll just go with the most tech-sounding option, anomaly-based. That's gotta be it, right?
upvoted 0 times
Salley
1 months ago
Signature-based could also be a good option. It's a common method used for intrusion detection.
upvoted 0 times
...
Virgie
2 months ago
I'm not sure, but I think network-based might be the right answer. It seems to match the description.
upvoted 0 times
...
Arthur
2 months ago
Yeah, I agree. It's always good to go with the option that sounds the most advanced.
upvoted 0 times
...
Camellia
2 months ago
I think anomaly-based is a good choice. It does sound pretty techy.
upvoted 0 times
...
...
Lorrine
3 months ago
Ooh, I know this one! It's definitely anomaly-based. That's the one that looks for deviations from the normal traffic patterns, right? I got this!
upvoted 0 times
Ronald
1 months ago
Actually, it's anomaly-based. It's all about detecting abnormal behavior on the network.
upvoted 0 times
...
Reuben
1 months ago
I think it's signature-based, it matches patterns of known attacks.
upvoted 0 times
...
Katy
2 months ago
Yes, you're correct! Anomaly-based IDS does indeed monitor network traffic for deviations from normal patterns.
upvoted 0 times
...
...
Franklyn
3 months ago
Okay, let's think this through. Signature-based and file-based don't really fit the description, so I'm gonna go with either network-based or anomaly-based.
upvoted 0 times
Carissa
2 months ago
Let's go with anomaly-based then.
upvoted 0 times
...
Eleni
3 months ago
Yeah, I agree. Network-based seems like a good choice too.
upvoted 0 times
...
Jessenia
3 months ago
I think anomaly-based makes more sense here.
upvoted 0 times
...
...
Filiberto
4 months ago
Hmm, this one seems tricky. I remember learning about the different types of IDS, but I'm not sure which one specifically monitors network traffic against a baseline.
upvoted 0 times
Launa
2 months ago
Great, thanks for the clarification!
upvoted 0 times
...
Whitney
2 months ago
I agree, Anomaly-based IDS monitors network traffic against a baseline
upvoted 0 times
...
Sherell
2 months ago
That makes sense, thanks for the clarification!
upvoted 0 times
...
Talia
2 months ago
I think the answer is D) Anomaly-based
upvoted 0 times
...
Maddie
2 months ago
I agree, Anomaly-based IDS monitors network traffic against a baseline.
upvoted 0 times
...
Tomoko
2 months ago
I think the correct answer is D) Anomaly-based.
upvoted 0 times
...
Cyndy
2 months ago
D) Anomaly-based
upvoted 0 times
...
Stephaine
2 months ago
D) Anomaly-based
upvoted 0 times
...
Stevie
2 months ago
C) File-based
upvoted 0 times
...
Walker
2 months ago
B) Network-based
upvoted 0 times
...
Reita
2 months ago
A) Signature-based
upvoted 0 times
...
Rosalyn
2 months ago
C) File-based
upvoted 0 times
...
Glynda
2 months ago
B) Network-based
upvoted 0 times
...
Donette
3 months ago
A) Signature-based
upvoted 0 times
...
...
Howard
4 months ago
I'm not sure, but I think it's between B) Network-based and D) Anomaly-based.
upvoted 0 times
...
Rory
4 months ago
I agree with Bok, Anomaly-based IDS compares network traffic against a baseline to detect unusual behavior.
upvoted 0 times
...
Bok
4 months ago
I think the answer is D) Anomaly-based.
upvoted 0 times
...

Save Cancel