Which of the following intrusion detection technologies can be used to accomplish the task?

Mark works as a Network Security Administrator for Umbrella Inc. The company has a Windows
domain-based network. To provide security to the network, Mark plans to configure IDS. He wants
to ensure that attackers are not able to modify or delete the system files. To determine such
attacks, the IDS must be able to monitor the file structure of the system. Which of the following
intrusion detection technologies can be used to accomplish the task?

Mark works as a Network Security Administrator for Umbrella Inc. The company has a Windows
domain-based network. To provide security to the network, Mark plans to configure IDS. He wants
to ensure that attackers are not able to modify or delete the system files. To determine such
attacks, the IDS must be able to monitor the file structure of the system. Which of the following
intrusion detection technologies can be used to accomplish the task?

A.
Network IDS

B.
Log File Monitor (LFM)

C.
Host-based IDS

D.
Systems Integrity Verifier (SIV)

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *