Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 10 discussion

Actual exam question from ECCouncil's 212-82
Question #: 10
Topic #: 1
[All 212-82 Questions]

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.

  • A. Not-use detection
  • B. Protocol anomaly detection
  • C. Anomaly detection
  • D. Signature recognition
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lucy11111
1 month, 2 weeks ago
The use of "evolving threats" makes all the difference. It's Anomaly Detection since signature detection are used for currently known intrusion unlike anomaly which is used for not known or evolving threat.
upvoted 1 times
...
NetworkH
2 months, 1 week ago
It is signature based. On page 814 in the EC Council Study guide it says this verbatim
upvoted 1 times
...
sfsc91
7 months, 1 week ago
Selected Answer: C
Signature recognition involves comparing network traffic or system activity against a database of known attack patterns or signatures. While effective at detecting known threats, signature recognition is not suitable for identifying new or evolving threats that do not match any existing signatures. Therefore, in this case, since the threat is evolving, Anomaly detection is the correct answer because the IDS is looking for deviations from normal behavior rather than specific known signatures of attacks.
upvoted 1 times
...
MPA3333
7 months, 2 weeks ago
Page 814 : it's signature-based recognition D
upvoted 1 times
...
bracokey
10 months, 2 weeks ago
From the EC CCT book, signature recongition '... This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision. ..'
upvoted 1 times
...
duke_of_kamulu
12 months ago
KEY WORD "defend against evolving threats" that is when anomaly comes in otherwise it could be signature based but that puts the difference
upvoted 2 times
...
RSMCT2011
1 year ago
Selected Answer: D
Signature Recognition Signature recognition, also known as misuse detection, tries to identify events that indicate an abuse of a system or network. This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision. The signatures for IDS were created under the assumption that the model must detect an attack without disturbing normal system traffic. Only attacks should match the model; otherwise, false alarms could occur.
upvoted 2 times
...
kikkie
1 year, 1 month ago
Signature based. Signature-based detection is typically best used for identifying known threats. It operates by using a pre-programmed list of known threats and their indicators of compromise (IOCs) while anomaly-based intrusion detection systems can alert you to suspicious behavior that is unknown.
upvoted 1 times
...
KnifeRing
1 year, 1 month ago
Answer Signature recognition This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision. The signatures for IDS were created under the assumption that the model must detect an attack without disturbing normal system traffic.
upvoted 2 times
...
AmesCB
1 year, 2 months ago
Answer is definitely signature recognition
upvoted 2 times
...
Munyasa
1 year, 4 months ago
This looks like signature recognition
upvoted 1 times
...
kanchantanwani
1 year, 4 months ago
Selected Answer: C
Anomaly-based detection is correct: The anomaly-based detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
upvoted 1 times
...
kanchantanwani
1 year, 5 months ago
I think it's Signature Detection too
upvoted 2 times
...
keloki2020
1 year, 5 months ago
This looks like Signature Detection to me.
upvoted 1 times
...
LPD
1 year, 10 months ago
Selected Answer: D
Not Anomaly detection. Possible OCR error.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...