header bg

Scan QR code or get instant email to install app

Question:

Terry installs a network-based intrusion detection system (IDS). What actions can he take on the traffic that flows through the IDS?

A Review the traffic based on rules and detect and alert about unwanted or undesirable traffic.
explanation

IDSs are capable of identifying malicious or unwanted traffic based on their detection rules and signatures, but they cannot prevent or modify traffic. On the other hand, an intrusion prevention system (IPS) that is deployed in-line with network traffic can take action on that traffic. As a result, IDSs are frequently employed when it is not feasible to block network traffic or when a tap or similar network device is employed to replicate traffic for examination.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*