New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GSEC Exam - Topic 7 Question 22 Discussion

Actual exam question for GIAC's GSEC exam
Question #: 22
Topic #: 7
[All GSEC Questions]

Which of the following applications cannot proactively detect anomalies related to a computer?

Show Suggested Answer Hide Answer
Suggested Answer: B

NIDS stands for network-based detection system. It cannot proactively detect anomalies related to a computer. It detects network related

anomalies.

A network-based detection system (NIDS) analyzes data packets flowing through a network. It can detect malicious packets that are

designed to be overlooked by a firewall's simplistic filtering rules. It is responsible for detecting anomalous or inappropriate data that may be

considered 'unauthorized' on a network. An NIDS captures and inspects all data traffic, regardless of whether it is permitted for checking or

not.

Answer options C, D, and A are incorrect. These applications can proactively detect anomalies related to a computer.

sTestsQuizNotesArticlesItemsReportsHelp


Contribute your Thoughts:

0/2000 characters
Daisy
4 months ago
Seems obvious, but I’m surprised firewalls are on this list!
upvoted 0 times
...
Owen
4 months ago
Wait, are we sure about anti-virus scanners?
upvoted 0 times
...
Glendora
4 months ago
HIDS is definitely for detecting anomalies.
upvoted 0 times
...
Beatriz
4 months ago
I thought NIDS could do that?
upvoted 0 times
...
Felicidad
5 months ago
Firewalls can't detect anomalies proactively.
upvoted 0 times
...
Lazaro
5 months ago
I'm a bit confused about HIDS and NIDS, but I think firewalls might be the one that doesn't proactively detect anomalies.
upvoted 0 times
...
Nichelle
5 months ago
I practiced a similar question where the focus was on what each application does, and I think anti-virus scanners can also detect anomalies, right?
upvoted 0 times
...
Jaclyn
5 months ago
I feel like NIDS and HIDS are designed specifically for detecting anomalies, so they wouldn't be the answer.
upvoted 0 times
...
Nicolette
5 months ago
I think I remember that firewalls mainly focus on controlling traffic rather than detecting anomalies, but I'm not entirely sure.
upvoted 0 times
...
Reiko
5 months ago
Hmm, the error message mentions an unknown priority name. I'm guessing there's an issue with the syntax in the syslog.conf file, but I'll need to double-check the details.
upvoted 0 times
...
Nickole
5 months ago
Ah, the ps command - a Unix staple. I believe it originated in System V, so I'll select B.
upvoted 0 times
...
Noble
5 months ago
I feel like the question about how blockchain functions in transactions was similar to one we practiced. B sounds familiar.
upvoted 0 times
...

Save Cancel