Which system monitors local system operation and local network access for violations of a security policy?
A . host-based intrusion detection
B . systems-based sandboxing
C . host-based firewall
D . antivirus
Answer: A
Explanation:
A host-based intrusion detection system (HIDS) monitors a computer system for suspicious activity by analyzing events occurring within that host. It can detect malicious activities and security policy violations by examining system calls, application logs, file-system modifications (such as rootkit installations), and other host activities. HIDS is an essential component in safeguarding the IT infrastructure against unauthorized access and security breaches.
Reference: = The Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) course material covers the monitoring of alerts and breaches, and the understanding and following of established procedures for response to alerts converted to incidents, which includes the use of host-based intrusion detection systems
Latest 200-201 Dumps Valid Version with 154 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund