New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 8 Question 69 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 69
Topic #: 8
[All GCIA Questions]

Which of the following intrusion detection systems (IDS) produces the false alarm because of the abnormal behavior of users and network?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Wynell
2 months ago
HIDS can also produce false alarms, but NIDS is more common.
upvoted 0 times
...
Luisa
2 months ago
I disagree, I believe it's A, APIDS.
upvoted 0 times
...
Albina
3 months ago
Wait, are we sure about that? I thought PIDS had more issues with false positives.
upvoted 0 times
...
Mozelle
3 months ago
Isn't it surprising how often these systems misidentify normal behavior?
upvoted 0 times
...
Elouise
3 months ago
I think it's definitely C, NIDS.
upvoted 0 times
...
Troy
3 months ago
I’m leaning towards A, Application protocol-based IDS, but I’m a bit confused about how they differ from the others in handling false alarms.
upvoted 0 times
...
Buck
4 months ago
I feel like I've seen a similar question before, and it was about how PIDS can misinterpret legitimate traffic as threats.
upvoted 0 times
...
Vanda
4 months ago
I'm not entirely sure, but I remember something about HIDS being more focused on host behavior, so maybe it's not that one?
upvoted 0 times
...
Mitsue
4 months ago
I think the answer might be C, Network intrusion detection system, because they often flag unusual traffic patterns.
upvoted 0 times
...
Aron
4 months ago
I'm pretty confident that the answer is C. Network intrusion detection systems (NIDS) analyze network traffic, so they would be the most susceptible to false alarms from unusual user activity on the network.
upvoted 0 times
...
Alexis
4 months ago
Okay, I think I've got this. NIDS monitors network traffic, so it would be the most likely to produce false alarms from abnormal user behavior, since it's not focused on the application layer like APIDS or the host like HIDS.
upvoted 0 times
...
Dion
5 months ago
Hmm, I'm a bit confused on the distinctions between APIDS, PIDS, NIDS, and HIDS. I'll need to review my notes to refresh my memory on how each one works.
upvoted 0 times
...
Elli
5 months ago
This one seems tricky. I'll need to think carefully about the differences between the IDS types and which one is most likely to produce false alarms due to user behavior.
upvoted 0 times
...
William
8 months ago
I wonder if any of these IDS systems can detect my stellar hacking skills. Guess I'll have to find out the hard way!
upvoted 0 times
...
Rodolfo
8 months ago
I hope the exam doesn't have any 'trick questions' like this one. These IDS types are enough to make your head spin!
upvoted 0 times
...
Devorah
8 months ago
I bet the answer is A) Application protocol-based intrusion detection system (APIDS). It's designed to detect issues with application-lDevorahl protocols, which could include user anomalies.
upvoted 0 times
Lawanda
8 months ago
I would go with C) Network intrusion detection system (NIDS) because it monitors network traffic for suspicious activities.
upvoted 0 times
...
Sarah
8 months ago
I think you're right, A) Application protocol-based intrusion detection system (APIDS) does focus on abnormal behavior of users and network.
upvoted 0 times
...
...
Ashton
8 months ago
This is a tricky one, but I'm going to go with C) Network intrusion detection system (NIDS). It seems the most likely to catch abnormal user behavior on the network.
upvoted 0 times
...
Catarina
8 months ago
Hmm, I'm not sure. Maybe B) Protocol-based intrusion detection system (PIDS) since it looks for deviations from normal protocol behavior.
upvoted 0 times
Clare
7 months ago
APIDS is more focused on specific application protocols for detecting abnormal behavior.
upvoted 0 times
...
Tu
8 months ago
True, but HIDS focuses on individual hosts for signs of intrusion.
upvoted 0 times
...
Renay
8 months ago
But NIDS also monitors network traffic for suspicious activity.
upvoted 0 times
...
Chantell
8 months ago
I think you might be right. PIDS does look for deviations in protocol behavior.
upvoted 0 times
...
...
Herman
9 months ago
D) Host-based intrusion detection system (HIDS) seems more likely to me. HIDS monitors the behavior of individual hosts and can identify unusual activity.
upvoted 0 times
Joni
8 months ago
NIDS may not be as effective in detecting abnormal user behavior compared to HIDS.
upvoted 0 times
...
Catarina
8 months ago
I agree, HIDS is designed to monitor individual hosts for unusual activity.
upvoted 0 times
...
Aleisha
8 months ago
I think HIDS is the best option for detecting abnormal behavior.
upvoted 0 times
...
...
Shawnna
9 months ago
I think the answer is C) Network intrusion detection system (NIDS). NIDS monitors network traffic and can detect anomalies that may indicate an attack.
upvoted 0 times
Izetta
8 months ago
I agree, NIDS can produce false alarms due to abnormal user and network behavior.
upvoted 0 times
...
Goldie
8 months ago
I think the answer is C) Network intrusion detection system (NIDS).
upvoted 0 times
...
...
Daren
9 months ago
I think D) HIDS is the correct answer since it detects abnormal behavior on individual hosts.
upvoted 0 times
...
Cecily
9 months ago
I'm leaning towards C) NIDS because it monitors network traffic for suspicious activity.
upvoted 0 times
...
Carmen
10 months ago
I disagree, I believe it's B) PIDS because it focuses on abnormal behavior.
upvoted 0 times
...
Della
10 months ago
I think the answer is A) APIDS.
upvoted 0 times
...

Save Cancel