Which of the following examines network traffic to identify threats that generate unusual traffic flows…?

Which of the following examines network traffic to identify threats that generate unusual traffic
flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy
violations?

Which of the following examines network traffic to identify threats that generate unusual traffic
flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy
violations?

A.
Network Behavior Analysis

B.
Network-based Intrusion Prevention

C.
Wireless Intrusion Prevention System

D.
Host-based Intrusion Prevention

Explanation:

Network Behavior Analysis examines network traffic to identify threats that generate unusual traffic
flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy
violations.
Answer option B is incorrect. Network-based Intrusion Prevention (NIPS) monitors the entire
network for suspicious traffic by analyzing protocol activity.
Answer option C is incorrect. Wireless Intrusion Prevention System (WIPS) monitors a wireless
network for suspicious traffic by analyzing wireless networking protocols.
Answer option D is incorrect. Host-based Intrusion Prevention (HIPS) is an installed software

package that monitors a single host for suspicious activity by analyzing events occurring within
that host.



Leave a Reply 0

Your email address will not be published. Required fields are marked *