exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 10 discussion

Actual exam question from ECCouncil's 212-82
Question #: 10
Topic #: 1
[All 212-82 Questions]

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.

  • A. Not-use detection
  • B. Protocol anomaly detection
  • C. Anomaly detection
  • D. Signature recognition
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
1 month, 3 weeks ago
Selected Answer: C
Certified Cybersecurity Technician Module 07 Page 811 Anomaly-based IDS: An anomaly-based IDS uses statistical techniques to compare the monitored traffic with the normal traffic.
upvoted 1 times
...
Raypapi
2 months, 1 week ago
Selected Answer: C
The correct answer is C. Anomaly detection. Rhett's description of the IDS solution, which creates models for possible intrusions and compares them with incoming events to make detection decisions, matches the concept of anomaly detection. This method involves identifying patterns or behavior that deviate from normal activity on the network, indicating potential intrusions or malicious activity.
upvoted 1 times
...
ChR0m15
2 months, 3 weeks ago
Selected Answer: C
Signature recognition – Signature-based detection relies on matching incoming events with known attack patterns or signatures. The scenario describes an IDS that creates models for normal behavior rather than matching with predefined signatures, so this is not the correct choice.
upvoted 1 times
...
ChR0m15
2 months, 3 weeks ago
Selected Answer: C
In Anomaly detection, the IDS (Intrusion Detection System) first creates baseline models for what is considered normal behavior within the network. It then compares incoming events or traffic against these models to detect deviations or anomalies, which could indicate potential intrusions or attacks. This method helps detect previously unknown or evolving threats, as it doesn't rely on pre-defined attack signatures, but rather identifies unusual patterns that differ from the baseline.
upvoted 1 times
...
lucy11111
6 months, 2 weeks ago
The use of "evolving threats" makes all the difference. It's Anomaly Detection since signature detection are used for currently known intrusion unlike anomaly which is used for not known or evolving threat.
upvoted 1 times
...
NetworkH
7 months, 1 week ago
It is signature based. On page 814 in the EC Council Study guide it says this verbatim
upvoted 1 times
...
sfsc91
1 year ago
Selected Answer: C
Signature recognition involves comparing network traffic or system activity against a database of known attack patterns or signatures. While effective at detecting known threats, signature recognition is not suitable for identifying new or evolving threats that do not match any existing signatures. Therefore, in this case, since the threat is evolving, Anomaly detection is the correct answer because the IDS is looking for deviations from normal behavior rather than specific known signatures of attacks.
upvoted 1 times
...
MPA3333
1 year ago
Page 814 : it's signature-based recognition D
upvoted 1 times
...
bracokey
1 year, 3 months ago
From the EC CCT book, signature recongition '... This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision. ..'
upvoted 1 times
...
duke_of_kamulu
1 year, 4 months ago
KEY WORD "defend against evolving threats" that is when anomaly comes in otherwise it could be signature based but that puts the difference
upvoted 2 times
...
RSMCT2011
1 year, 4 months ago
Selected Answer: D
Signature Recognition Signature recognition, also known as misuse detection, tries to identify events that indicate an abuse of a system or network. This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision. The signatures for IDS were created under the assumption that the model must detect an attack without disturbing normal system traffic. Only attacks should match the model; otherwise, false alarms could occur.
upvoted 2 times
...
kikkie
1 year, 5 months ago
Signature based. Signature-based detection is typically best used for identifying known threats. It operates by using a pre-programmed list of known threats and their indicators of compromise (IOCs) while anomaly-based intrusion detection systems can alert you to suspicious behavior that is unknown.
upvoted 1 times
...
KnifeRing
1 year, 6 months ago
Answer Signature recognition This technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision. The signatures for IDS were created under the assumption that the model must detect an attack without disturbing normal system traffic.
upvoted 2 times
...
AmesCB
1 year, 7 months ago
Answer is definitely signature recognition
upvoted 2 times
...
Munyasa
1 year, 9 months ago
This looks like signature recognition
upvoted 1 times
...
kanchantanwani
1 year, 9 months ago
Selected Answer: C
Anomaly-based detection is correct: The anomaly-based detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
upvoted 1 times
...
kanchantanwani
1 year, 10 months ago
I think it's Signature Detection too
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago