New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 11 Question 66 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 66
Topic #: 11
[All SSCP Questions]

Network-based Intrusion Detection systems:

Show Suggested Answer Hide Answer
Suggested Answer: A

Computer worms are also known as Network Mobile Code, or a virus-like bit of code that can replicate itself over a network, infecting adjacent computers.

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

A notable example is the SQL Slammer computer worm that spread globally in ten minutes on January 25, 2003. I myself came to work that day as a software tester and found all my SQL servers infected and actively trying to infect other computers on the test network.

A patch had been released a year prior by Microsoft and if systems were not patched and exposed to a 376 byte UDP packet from an infected host then system would become compromised.

Ordinarily, infected computers are not to be trusted and must be rebuilt from scratch but the vulnerability could be mitigated by replacing a single vulnerable dll called sqlsort.dll.

Replacing that with the patched version completely disabled the worm which really illustrates to us the importance of actively patching our systems against such network mobile code.

The following answers are incorrect:

- Rootkit: Sorry, this isn't correct because a rootkit isn't ordinarily classified as network mobile code like a worm is. This isn't to say that a rootkit couldn't be included in a worm, just that a rootkit isn't usually classified like a worm. A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. The term rootkit is a concatenation of 'root' (the traditional name of the privileged account on Unix operating systems) and the word 'kit' (which refers to the software components that implement the tool). The term 'rootkit' has negative connotations through its association with malware.

- Adware: Incorrect answer. Sorry but adware isn't usually classified as a worm. Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. The term is sometimes used to refer to software that displays unwanted advertisements.

- Logic Bomb: Logic bombs like adware or rootkits could be spread by worms if they exploit the right service and gain root or admin access on a computer.

The following reference(s) was used to create this question:

The CCCure

CompTIA Holistic Security+ Tutorial and CBT

and

http://en.wikipedia.org/wiki/Rootkit

and

http://en.wikipedia.org/wiki/Computer_worm

and

http://en.wikipedia.org/wiki/Adware


Contribute your Thoughts:

0/2000 characters
Sharen
4 months ago
A is the standard, can't believe anyone would pick anything else!
upvoted 0 times
...
Salena
4 months ago
D is just wrong, they don't typically reside on a host.
upvoted 0 times
...
Stefan
4 months ago
Surprised to see C as an option, that doesn't make sense!
upvoted 0 times
...
Lore
4 months ago
I think B is misleading, they usually do monitor traffic.
upvoted 0 times
...
Kathrine
4 months ago
A is definitely the right choice!
upvoted 0 times
...
Erick
5 months ago
I recall that host-based systems monitor traffic on individual hosts, which makes me think D is not applicable here.
upvoted 0 times
...
Derick
5 months ago
I practiced a similar question, and I think network-based IDS definitely monitor traffic, so C doesn't seem right.
upvoted 0 times
...
Geoffrey
5 months ago
I'm not entirely sure, but I feel like there was something about IDS not always being on a discrete segment. Maybe option B?
upvoted 0 times
...
Stefan
5 months ago
I remember studying that network-based IDS typically monitors traffic on a specific segment, so I think option A might be correct.
upvoted 0 times
...
Georgiann
5 months ago
Hmm, I'm a bit unsure about this one. I think it might be D, set clusterXL down, but I'm not 100% confident. I'll have to review my notes again.
upvoted 0 times
...
Reuben
5 months ago
Supplier relationship management sounds familiar, but I wonder if it actually provides the necessary guarantees about supplier capabilities?
upvoted 0 times
...
Felton
5 months ago
Okay, let me see here. The question is asking what customer's quality expectations identify. I'm leaning towards C, since that seems to be the most relevant answer in terms of defining the level of quality the customer expects.
upvoted 0 times
...
Kimberlie
9 months ago
If the IDS isn't monitoring the traffic, it might as well be a music player. I'm going to have to go with A on this one.
upvoted 0 times
...
Brendan
9 months ago
D makes sense if you're trying to monitor a specific host, but network-based IDSes are usually deployed more broadly. I'll go with A as well.
upvoted 0 times
Regenia
8 months ago
Definitely, it's a common practice to have network-based IDS on a separate segment for better security monitoring.
upvoted 0 times
...
Aileen
8 months ago
Yeah, having the IDS on a discrete network segment helps with monitoring and detecting intrusions.
upvoted 0 times
...
Alison
8 months ago
I agree, it's important for the IDS to be able to monitor the traffic on that network segment.
upvoted 0 times
...
Elmira
9 months ago
I think A makes sense, network-based IDS usually monitor a specific network segment.
upvoted 0 times
...
...
Nickolas
10 months ago
C seems like it would be a pretty pointless setup. Why have an IDS if it's not even looking at the traffic? I'm going to go with A.
upvoted 0 times
Georgeanna
8 months ago
B) Commonly will not reside on a discrete network segment and monitor the traffic on that network segment.
upvoted 0 times
...
Eleni
9 months ago
I agree, C does seem pointless. A makes more sense.
upvoted 0 times
...
Boris
9 months ago
A) Commonly reside on a discrete network segment and monitor the traffic on that network segment.
upvoted 0 times
...
...
Dwight
10 months ago
Wait, so they don't actually monitor the traffic on the segment they're on? That's kind of useless, isn't it? I'll go with B.
upvoted 0 times
Lourdes
9 months ago
I believe they do monitor the traffic on the segment they're on. A seems like the right choice.
upvoted 0 times
...
Miss
9 months ago
I'm not sure, but I think they monitor the traffic on the network segment they're on. I'll choose A too.
upvoted 0 times
...
Julie
9 months ago
I think they do monitor the traffic on the segment they're on. I'll go with A.
upvoted 0 times
...
...
Royal
10 months ago
Option A sounds about right. I've seen these systems deployed on dedicated network segments to monitor traffic in that area.
upvoted 0 times
Ashton
9 months ago
Having them on a separate network segment definitely adds an extra layer of security.
upvoted 0 times
...
Jesusa
9 months ago
I've also seen them on dedicated network segments, it helps with monitoring traffic effectively.
upvoted 0 times
...
Catherin
9 months ago
I agree, option A seems to be the most common setup for network-based intrusion detection systems.
upvoted 0 times
...
...
Mitzie
11 months ago
I'm not sure, but I think the answer might be D, as IDS can also reside on a host.
upvoted 0 times
...
Bette
11 months ago
I agree with Chaya, because IDS usually monitor a specific network segment.
upvoted 0 times
...
Chaya
11 months ago
I think the answer is A.
upvoted 0 times
...

Save Cancel