Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 155 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 155
Topic #: 1
[All 312-49v10 Questions]

George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.
What IDS feature must George implement to meet this requirement?

  • A. Signature-based anomaly detection
  • B. Pattern matching
  • C. Real-time anomaly detection
  • D. Statistical-based anomaly detection
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Elb
6 months, 3 weeks ago
Selected Answer: C
TIM [Time-based induction machine] performs real-time anomaly detection.
upvoted 1 times
...
Elb
6 months, 3 weeks ago
V > TIM / Time-based induction machine: perform real-time anomaly detection.
upvoted 1 times
...
BarryMacockener
2 years ago
Selected Answer: C
The answer is definitely C, not D. A time-based induction machine is used to perform real-time anomaly detection. https://www.technicalconfessions.com/posts/CISSP-Topic-2-Access-Control-3-of-3
upvoted 2 times
...
vcloudpmp
2 years, 8 months ago
D. How long does it take to learn statistical-based intrusion detection techniques? The learning process of statistical-based techniques takes days or weeks to become accurate and effective. Figure 3. Classification of anomaly-based intrusion detection techniques. cific attacks and system vulnerabilities. This knowledge can be further used to identify the intrusions or attacks happening in the network or system.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...