Which of the following monitor network devices so that security administrators can identify attacks in progress and stop them?

Siarhei - stock.adobe.com

Want a baseline of your intrusion detection and prevention system knowledge? Test your insights with this IDS/IPS quiz.

Intrusion detection and prevention systems were once mainstays in enterprise network security. Though their capabilities and features are still critical, they are now often rolled into security suites or platforms.

Alongside firewalls, antimalware and a slew of other security mechanisms, IDS and IPS remain key components of the network security puzzle. As with any security investment, informed decisions about why and how to use IDS/IPS must be made before deployment. Otherwise, the products' hefty price tags will drain your resources.

Test your IDS/IPS know-how, and improve your knowledge with this quiz.

This was last published in July 2020

Dig Deeper on Threat detection and response

  • intrusion detection system (IDS)

    By: Ben Lutkevich

  • subnet (subnetwork)

    By: Kevin Ferguson

  • intrusion prevention system (IPS)

    By: Alexander Gillis

  • Host IDS vs. network IDS: Which is better?

    By: Kevin Beaver

Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly

SearchNetworking

  • DNS server troubleshooting for Linux and Windows

    Steps in DNS server troubleshooting include checking the DNS status, looking at zone configurations and evaluating logs. Follow ...

  • Techniques to get started with green networking

    'Emerging Green Technologies' details how technology is a flexible tool organizations can use to make business operations more ...

  • How energy-efficient networking supports sustainability

    In this Q&A, 'Emerging Green Technologies' author Matthew N. O. Sadiku discusses the importance of going green and how to make ...

SearchCIO

  • Inflation Reduction Act boosts clean energy incentives

    The Inflation Reduction Act increases incentives for clean energy, but there is concern that it doesn't address existing ...

  • Privacy bill ADPPA to police data sharing, algorithmic bias

    The ADPPA passed the U.S. House Committee on Energy and Commerce in July, making it farther than other recently introduced data ...

  • Amazon evolves healthcare approach, ends Amazon Care

    The end of Amazon Care and acquisition of One Medical means Amazon is turning from employee health to direct to consumer.

SearchEnterpriseDesktop

  • HP, Dell report cooling PC sales as business demand wavers

    Businesses have delayed and reduced their desktop and laptop orders from HP and Dell, executives reported. The PC market has ...

  • An introduction to Edge Chromium vs. Edge

    The shift to Chromium has improved several aspects of Microsoft's Edge browser -- from privacy settings to reliability.

  • The role of Windows log monitoring in the enterprise

    Whether organizations automate their log monitoring within Windows desktops or inspect them manually, logs can offer IT ...

SearchCloudComputing

  • VMware CEO reveals big changes amid multi-cloud shift

    VMware plans to change products, strategic direction and marketing to keep up with customers rushing to deploy multi-cloud ...

  • IBM, VMware to jointly develop services for hybrid clouds

    IBM and VMware expanded their long-held partnership with a deal to provide hybrid cloud services and consulting to IT pros in ...

  • VMware expands vSphere, vSAN for hybrid cloud enterprises

    Updates to VMware's flagship vSphere and vSAN software keep pace with enterprise interest in hybrid cloud infrastructure for ...

ComputerWeekly.com

  • Cloud bursting: What it is and what it’s good for

    We look at cloud bursting, which allows organisations to meet demand by bursting compute and storage to the cloud

  • Interview: Sibstar, the fintech app for dementia sufferers

    Creator of app and debit card designed to support people living with dementia tells Computer Weekly how the idea developed

  • Ericsson claims sustainability gains with tri-sector 5G radio

    Swedish comms tech provider makes further inroads into more sustainable networks with the introduction of a new triple-band, ...

Which type of device monitors a network hardware so that security administrators can identify attacks in progress and stop them?

An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Any malicious activity or violation is typically reported or collected centrally using a security information and event management system.

What type of firewall inspects network traffic at a higher level in the OSI model?

A stateful inspection firewall examines network traffic to determine whether one packet is related to another packet. A proxy firewall (aka application-level gateway) inspects packets at the application layer of the Open Systems Interconnection (OSI) reference model.

Which of the following sits between the Internet and the internal network and is sometimes referred to as a perimeter network?

A DMZ Network is a perimeter network that protects and adds an extra layer of security to an organization's internal local-area network from untrusted traffic. A common DMZ is a subnetwork that sits between the public internet and private networks.

What router feature provides basic security?

Firewall. Most Cisco routers come with a firewall. There are two types of firewall: a software firewall -- like the one Windows has -- and a hardware firewall, which is the router. The router acts as a barrier between the Internet and devices on your home network.

Toplist

Neuester Beitrag

Stichworte