New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CSSLP Exam - Topic 11 Question 107 Discussion

Actual exam question for ISC2's CSSLP exam
Question #: 107
Topic #: 11
[All CSSLP Questions]

Which of the following is designed to detect unwanted attempts at accessing, manipulating, and disabling of computer systems through the Internet?

Show Suggested Answer Hide Answer
Suggested Answer: C

An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or

disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by

crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted traffic. An intrusion detection

system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes

network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation,

unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).

Answer D is incorrect. Access Control List (ACL) is the most commonly used object in Cisco IOS. It filters packets or network traffic by

controlling whether routed packets are forwarded or blocked at the router's interfaces. According to the criteria specified within the access

lists, router determines whether the packets to be forwarded or dropped. Access control list criteria could be the source or destination

address of the traffic or other information. The types of Cisco ACLs are Standard IP, Extended IP, IPX, Appletalk, etc.

Answer B is incorrect. Internet Protocol Security (IPSec) is a method of securing data. It secures traffic by using encryption and digital

signing. It enhances the security of data as if an IPSec packet is captured, its contents cannot be read. IPSec also provides sender verification

that ensures the certainty of the datagram's origin to the receiver.

Answer A is incorrect. Direct-attached storage (DAS) is a digital storage system that is directly attached to a server or workstation,

without using a storage network.


Contribute your Thoughts:

0/2000 characters
Penney
12 hours ago
Haha, I bet the exam writers love coming up with these tricky security questions. I'm just glad I don't have to deal with this stuff in my job.
upvoted 0 times
...
Dorinda
6 days ago
I'm pretty sure IDS stands for "Intrusion Detection System." Gotta love those cybersecurity acronyms!
upvoted 0 times
...
Adell
11 days ago
Definitely C. I've had to deal with IDS alerts before when I accidentally triggered them. Not fun.
upvoted 0 times
...
Afton
16 days ago
I always get IDS and IPS mixed up. Maybe I should just remember "I Detect Stuff" for IDS.
upvoted 0 times
...
Jovita
21 days ago
C) IDS is the correct answer. It's designed to detect and prevent unauthorized access to computer systems.
upvoted 0 times
...
Carri
26 days ago
I’m leaning towards C) IDS too, but I wonder if IPsec could also be relevant in some way.
upvoted 0 times
...
Page
1 month ago
I keep mixing up IDS and ACL; I think IDS is the right choice, but I need to double-check the definitions.
upvoted 0 times
...
Francisca
1 month ago
I remember studying about network security, and I feel like IDS was mentioned in a similar question about monitoring threats.
upvoted 0 times
...
Lawana
1 month ago
I think it's C) IDS, but I'm not entirely sure if it also covers manipulation attempts.
upvoted 0 times
...
Mirta
2 months ago
I think the key here is looking for the option that is specifically designed for detecting unwanted access and attacks. That narrows it down to either IDS or ACL. I'm leaning towards IDS, but I'll double-check my understanding just to be sure.
upvoted 0 times
...
James
2 months ago
I'm a bit confused on this one. Is IPsec also related to network security and intrusion detection? I'll have to review my notes to make sure I understand the differences between these options.
upvoted 0 times
...
Lettie
2 months ago
Okay, let me see. IDS is an Intrusion Detection System, so that sounds like it would be the right answer to detect unwanted access attempts. I'm pretty confident that's the correct choice.
upvoted 0 times
...
Ruthann
2 months ago
I think it's C) IDS. It monitors for intrusions.
upvoted 0 times
...
Son
2 months ago
It's definitely C) IDS.
upvoted 0 times
...
James
3 months ago
Definitely C) IDS. It detects unwanted access attempts.
upvoted 0 times
...
Luann
3 months ago
Totally agree, C) IDS is the right answer!
upvoted 0 times
...
Aracelis
3 months ago
Hmm, I'm not totally sure about this one. I know IDS has something to do with network security, but I can't remember the exact details. I'll have to think it through carefully.
upvoted 0 times
...
Sheridan
3 months ago
I think the answer is C) IDS. That's the one that's designed to detect unauthorized access and attacks on computer systems, right?
upvoted 0 times
Lamonica
2 months ago
I agree, C) IDS is the right choice!
upvoted 0 times
...
...

Save Cancel