What type of solution would be best for Lyle?

Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle’s company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide.

What type of solution would be best for Lyle?
A . A NEPT implementation would be the best choice.
B . To better serve the security needs of his company, Lyle should use a HIDS system.
C . Lyle would be best suited if he chose a NIPS implementation
D . He should choose a HIPS solution, as this is best suited to his needs.

Answer: C

Explanation:

Lyle’s requirements indicate the need for a network-wide solution that is easy to implement and capable of dropping malicious packets to prevent external attacks. A Network Intrusion Prevention System (NIPS) is designed to be deployed across the network to inspect traffic and take action based on predefined security policies, such as dropping malicious packets. NIPS solutions are generally easier to manage and deploy compared to Host Intrusion Prevention Systems (HIPS), which require installation on individual endpoints. Moreover, NIPS can provide a centralized security solution for all the network nodes and workstation nodes that Lyle is concerned about, making it a suitable choice for his medium-sized company.

Reference: The Certified Network Defender (CND) course by EC-Council emphasizes the importance of understanding and using IDS/IPS technologies to protect, detect, respond, and predict network security incidents1. The course also covers the protect, detect, respond, and predict approach to network security, which aligns with the capabilities of a NIPS solution23.

Latest 312-38 Dumps Valid Version with 120 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments