exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 48 discussion

Actual exam question from Cisco's 200-201
Question #: 48
Topic #: 1
[All 200-201 Questions]

What is a difference between signature-based and behavior-based detection?

  • A. Signature-based identifies behaviors that may be linked to attacks, while behavior-based has a predefined set of rules to match before an alert.
  • B. Behavior-based identifies behaviors that may be linked to attacks, while signature-based has a predefined set of rules to match before an alert.
  • C. Behavior-based uses a known vulnerability database, while signature-based intelligently summarizes existing data.
  • D. Signature-based uses a known vulnerability database, while behavior-based intelligently summarizes existing data.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
drdecker100
Highly Voted 1 year, 8 months ago
Selected Answer: B
Signature-based detection and behavior-based detection are two common approaches used in cybersecurity to detect and prevent attacks. The main difference between these two methods is how they identify potential threats. Signature-based detection involves using a predefined set of rules, or signatures, to identify known patterns of malicious activity. These signatures are often based on specific characteristics of a known threat, such as a particular virus or malware strain. When a signature-based system detects a pattern that matches one of these predefined rules, it generates an alert or takes some other action to prevent the attack. On the other hand, behavior-based detection focuses on identifying abnormal behavior that may indicate an attack. Instead of using predefined rules or signatures, behavior-based systems analyze patterns of activity to identify anomalies that may be indicative of an attack. For example, a behavior-based system might flag an unusual amount of network traffic from a particular device or identify a user accessing a critical system outside of normal business hours.
upvoted 8 times
...
RoBery
Most Recent 9 months, 2 weeks ago
B is correct. in D, it talks about known vulnerabilities, not known threats.
upvoted 1 times
...
itmonkey1
1 year, 7 months ago
I agree the answer is B because signature-based detection is only known threats. Known threats mean it most certainly has rules established already and detected based on pre-established rules.
upvoted 2 times
...
trigger4848
1 year, 11 months ago
Selected Answer: D
The answer is "D" and is correct. Read "B" carefully it says "Behavior-based identifies behaviors that may be linked to attacks" ---- this is not behavior based...this is almost the definition of signature based. Behavior based identifies anomalies
upvoted 3 times
...
Nhendy
2 years, 3 months ago
Selected Answer: B
vote for B too
upvoted 3 times
...
anonymous1966
2 years, 3 months ago
Selected Answer: B
Behavior is statistical, and can use AI and ML. "Summarize" is not correct
upvoted 1 times
...
adodoccletus
2 years, 4 months ago
D is correct the signature base uses a know vulnerability table, which means a vulnerability is already known and signed as a vulnerability. In contrast, the behavior base looks through already existing data and sees if there is abnormal behavior.
upvoted 4 times
...
PanteLa_26
2 years, 9 months ago
Selected Answer: B
Should be B imho
upvoted 3 times
...
DaveEly
2 years, 9 months ago
I think it could be also B.
upvoted 1 times
...
Samuelpn96
2 years, 9 months ago
Selected Answer: B
Instead of searching for patterns linked to specific types of attacks, behavior-based IDS solutions monitor behaviors that may be linked to attacks, increasing the likelihood of identifying and mitigating a malicious action before the network is compromised. https://accedian.com/blog/what-is-the-difference-between-signature-based-and-behavior-based-ids/
upvoted 4 times
...
halamah
2 years, 11 months ago
d is correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago