New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 1 Question 11 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 11
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

Which of the following is a limitation of intrusion detection systems (IDS)?

Show Suggested Answer Hide Answer
Suggested Answer: B

A limitation of intrusion detection systems (IDS) is that they cannot detectapplication-level vulnerabilities. An IDS is a tool that monitors network traffic or system activity and alerts on any suspicious or malicious events. However, an IDS cannot analyze the logic or functionality of applications and identify vulnerabilities such as SQL injection, cross-site scripting, or broken authentication.


Contribute your Thoughts:

0/2000 characters
Kathrine
3 months ago
I disagree, weak passwords aren't a limitation of IDS itself.
upvoted 0 times
...
Arthur
3 months ago
D is surprising, weak passwords shouldn't even be a thing!
upvoted 0 times
...
Carry
3 months ago
C is a real issue, systems need better integration.
upvoted 0 times
...
Lenna
4 months ago
I think B is more critical, app vulnerabilities are huge!
upvoted 0 times
...
Azzie
4 months ago
A is definitely a limitation, not enough evidence sometimes.
upvoted 0 times
...
Tiara
4 months ago
Weak passwords for the admin console seem like a security issue, but I'm not convinced it's a limitation of the IDS itself.
upvoted 0 times
...
Chu
4 months ago
I practiced a question similar to this, and I feel like the lack of interface with system tools could be a limitation, but I can't recall the details.
upvoted 0 times
...
France
4 months ago
I think application-level vulnerabilities are a concern, but I'm not sure if that's a limitation of IDS specifically.
upvoted 0 times
...
Felix
5 months ago
I remember reading that IDS can struggle with providing enough evidence on intrusive activity, so maybe A is the right choice?
upvoted 0 times
...
Olene
5 months ago
This is a tricky one. I'm torn between a few of the options, like the application-level vulnerabilities and the lack of interface with system tools. I'll need to weigh the pros and cons of each before making a decision.
upvoted 0 times
...
Glory
5 months ago
Okay, I've got a strategy for this. I know that IDSes have limitations in detecting stealthy or advanced attacks, so I'm going to focus on that angle. I think the "limited evidence on intrusive activity" option sounds like the best fit.
upvoted 0 times
...
Louvenia
5 months ago
Hmm, I'm a bit unsure about this one. The options seem to cover different aspects, but I'm not entirely sure which one is the most significant limitation. I'll need to think this through carefully.
upvoted 0 times
...
Kyoko
5 months ago
This seems like a straightforward question about the limitations of intrusion detection systems. I'll need to carefully review the options and think about the key weaknesses of IDSes.
upvoted 0 times
...
Fabiola
5 months ago
This one seems pretty straightforward. The question is asking for a Dynamics 365 product that includes integrated rate shipping costs, so I'm going to go with Dynamics 365 Supply Chain Management.
upvoted 0 times
...
Vincent
5 months ago
I'm pretty confident I know the answer to this one. Oracle Projects supports Team Roles, Named Person, and Jobs as the three types of People Resources.
upvoted 0 times
...
Jean
5 months ago
This question seems straightforward, I think the benefit of implementing the Request to Fulfill value stream is ensuring the service actually performs as requested.
upvoted 0 times
...
Marti
5 months ago
Hmm, this looks like a tricky one. I'll need to carefully review the exhibit and think through the different options.
upvoted 0 times
...
Gwen
5 months ago
This seems pretty straightforward. I think the key is using node affinity labels to ensure each workload is hosted on the correct node group.
upvoted 0 times
...
Tatum
2 years ago
Yes, if IDS cannot interface with other system tools, it may not be able to provide comprehensive protection.
upvoted 0 times
...
Cassie
2 years ago
I think lack of interface with system tools is also a significant limitation.
upvoted 0 times
...
Edelmira
2 years ago
That's a good point, without enough evidence, IDS may not be able to effectively detect intrusions.
upvoted 0 times
...
Matthew
2 years ago
I believe another limitation is limited evidence on intrusive activity.
upvoted 0 times
...
Tatum
2 years ago
I agree with Edelmira, having weak passwords can compromise the security of the IDS.
upvoted 0 times
...
Edelmira
2 years ago
I think the limitation of IDS is weak passwords for the administration console.
upvoted 0 times
...

Save Cancel