New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 10 Question 5 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 5
Topic #: 10
[All SSCP Questions]

Which of the following would assist the most in Host Based intrusion detection?

Show Suggested Answer Hide Answer
Suggested Answer: A

To assist in Intrusion Detection you would review audit logs for access violations.

The following answers are incorrect:

access control lists. This is incorrect because access control lists determine who has access to what but do not detect intrusions.

security clearances. This is incorrect because security clearances determine who has access to what but do not detect intrusions.

host-based authentication. This is incorrect because host-based authentication determine who have been authenticated to the system but do not dectect intrusions.


Contribute your Thoughts:

0/2000 characters
Dorsey
4 months ago
Totally agree with audit trails being the most helpful!
upvoted 0 times
...
Delsie
4 months ago
Wait, security clearances? Really? That seems off.
upvoted 0 times
...
Kirby
4 months ago
Access control lists are important, but not the best for detection.
upvoted 0 times
...
Adell
4 months ago
I think host-based authentication is key too.
upvoted 0 times
...
Vincent
5 months ago
Definitely audit trails! They provide a detailed log of activities.
upvoted 0 times
...
Lovetta
5 months ago
I’m leaning towards audit trails too, but I wonder if security clearances might play a role in preventing unauthorized access in the first place.
upvoted 0 times
...
Joaquin
5 months ago
Host-based authentication seems like it could help, but I feel like audit trails would provide more detailed insights into what happened during an intrusion.
upvoted 0 times
...
Dick
5 months ago
I remember a practice question that emphasized the role of access control lists in security, but I don't recall how they relate specifically to intrusion detection.
upvoted 0 times
...
Mozell
5 months ago
I think audit trails are really important for host-based intrusion detection, but I'm not entirely sure if they're the best option here.
upvoted 0 times
...
Vincent
5 months ago
I remember learning about DLP in class, I'm pretty confident I can select the correct answer.
upvoted 0 times
...
Odette
5 months ago
This looks like a pretty straightforward question about VMware Horizon and vSAN. I think I've got a good handle on this topic, so I'll give it a shot.
upvoted 0 times
...
Tamekia
5 months ago
I feel like G could be true, too, but I'm not sure how outsourcing increases confidentiality.
upvoted 0 times
...
Jaclyn
5 months ago
I'm a bit confused about the SQL Server licensing aspect. Is that something Blue Prism explicitly considers for its licenses?
upvoted 0 times
...

Save Cancel