You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
Firewall logs will show all incoming and outgoing traffic. By examining those logs you can detect anomalous traffic, which can indicate the presence of malicious code such as rootkits.
Answer B is incorrect. While an IDS might be the most obvious solution in this scenario, it is not the only one.
Answer C is incorrect. It is very unlikely that anything in your domain controller logs will show the presence of a rootkit, unless that
rootkit is on the domain controller itself.
Answer A is incorrect. A DMZ is an excellent firewall configuration but will not aid in detecting rootkits.
Casey
4 months agoLourdes
4 months agoStevie
4 months agoKimbery
4 months agoEstrella
5 months agoAlise
5 months agoKing
5 months agoDeandrea
5 months agoWinfred
5 months agoTawny
5 months agoSherita
5 months agoAlex
5 months agoElke
5 months ago